SlideShare a Scribd company logo
WorkingfromHome usingFortinetSSLVPN withSingle-On
NASEEMKHOODORUTH 1
FORTINET
Contents
FORTINET...................................................................................................................................................................1
Enable FSSOfor Single-On.......................................................................................................................................2
Active Directory - create group forVPN Users...........................................................................................................6
How to setup SSL VPN on the firewall ......................................................................................................................7
How to configure client for User to connect via SSL VPN.............................................................................................10
WorkingfromHome usingFortinetSSLVPN withSingle-On
NASEEMKHOODORUTH 2
Enable FSSO for Single-On
DownloadandInstall the FSMO(I use FSSO_Setup_5.0.0276_x64, downloadfromthe customerportal)
Configurationguide: https://docs.fortinet.com/document/fortigate/6.0.0/cookbook/573568/installing-the-fsso-agent
Installationmode DCAgent
WorkingfromHome usingFortinetSSLVPN withSingle-On
NASEEMKHOODORUTH 3
Install the DC Agentand thenconfigure the Fortinetsingle signon
Checkthe Fortinetsingle signonagentstatus(same needtoconfigure inthe FortiGate securityfabric)
WorkingfromHome usingFortinetSSLVPN withSingle-On
NASEEMKHOODORUTH 4
Loginto the FortiGate adminportal
To configure the LDAPservice,gotoUser & Device >LDAP ServersandselectCreate New.
Setthe name,DCIP, Distinguishedname (example:DC=Contoso,DC=local)
TestConnectivity=successful
Now add connector
Create a Fabric Connectortothe FSSO agentby goingtoSecurityFabric> FabricConnectorsandselect+ Create New.
WorkingfromHome usingFortinetSSLVPN withSingle-On
NASEEMKHOODORUTH 5
Once done the arrow up shouldbe greenstatus
WorkingfromHome usingFortinetSSLVPN withSingle-On
NASEEMKHOODORUTH 6
Now single sign-onisenable and configured
Active Directory - create group for VPN Users
SSL VPN Usersgroup add onlymembersthatwill be allowedforVPN
Importthe group to FortiGate
WorkingfromHome usingFortinetSSLVPN withSingle-On
NASEEMKHOODORUTH 7
How to setup SSL VPN on the firewall
Configure the SSL-VPN Settings
https://docs.fortinet.com/document/fortigate/6.0.0/cookbook/690301/configuring-the-ssl-vpn-tunnel
The listenonport 10443 should be openon the ISP router (port forwarding or DMZ)
Note:DNSspecifythe local domaincontroller IPaddress fordnsresolution.Secondcanbe google dns
Specifythe IPrangesforclient,Addthe VPN Groupfrom ADthat will be allow forVPN
WorkingfromHome usingFortinetSSLVPN withSingle-On
NASEEMKHOODORUTH 8
Configure the IPv4Policy
VPN to LAN for Local Access
VPN to WAN for InternetAccessviaVPN
VPN to LAN
WorkingfromHome usingFortinetSSLVPN withSingle-On
NASEEMKHOODORUTH 9
VPN to WAN
WorkingfromHome usingFortinetSSLVPN withSingle-On
NASEEMKHOODORUTH 10
How to configure client for User to connect via SSL VPN
Loginto the portal fromexternal (https://publicipordynaccount:10443/)
Downloadandinstall FortiClient
https://www.forticlient.com/downloads
WorkingfromHome usingFortinetSSLVPN withSingle-On
NASEEMKHOODORUTH 11
AfterinstallationlaunchforFortinetConsole fromthe tray
Addnewconnection
Setthe connectionname,remote gateway(publicipordynaccount),port
WorkingfromHome usingFortinetSSLVPN withSingle-On
NASEEMKHOODORUTH 12
Once connectedyoucan access youroffice network

More Related Content

What's hot

Understanding SASE
Understanding SASE Understanding SASE
Understanding SASE
Haris Chughtai
 
Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 16, 17, 18
Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 16, 17, 18Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 16, 17, 18
Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 16, 17, 18
BGA Cyber Security
 
FortiGate_Sec_02_Security Fabric (1).pptx
FortiGate_Sec_02_Security Fabric (1).pptxFortiGate_Sec_02_Security Fabric (1).pptx
FortiGate_Sec_02_Security Fabric (1).pptx
NajahIdrissiMoulayRa
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
Tandhy Simanjuntak
 
Metasploit Framework - Giris Seviyesi Guvenlik Denetim Rehberi
Metasploit Framework - Giris Seviyesi Guvenlik Denetim RehberiMetasploit Framework - Giris Seviyesi Guvenlik Denetim Rehberi
Metasploit Framework - Giris Seviyesi Guvenlik Denetim RehberiFatih Ozavci
 
Secure Your Salesforce Org with Two-Factor Authentication
Secure Your Salesforce Org with Two-Factor AuthenticationSecure Your Salesforce Org with Two-Factor Authentication
Secure Your Salesforce Org with Two-Factor Authentication
Salesforce Admins
 
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityCybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber Security
Eryk Budi Pratama
 
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSymantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Sree Harsha Boyapati
 
Enterprise Architecture and Information Security
Enterprise Architecture and Information SecurityEnterprise Architecture and Information Security
Enterprise Architecture and Information Security
John Macasio
 
Designing Secure Cisco Data Centers
Designing Secure Cisco Data CentersDesigning Secure Cisco Data Centers
Designing Secure Cisco Data Centers
Cisco Russia
 
Sample lld document v1.0
Sample lld document v1.0Sample lld document v1.0
Sample lld document v1.0
Tom Mark Giembicki
 
Windows Sistemler için Sysmon ve Wazuh Kullanarak Mitre ATT&CK Kurallarının ...
Windows Sistemler için Sysmon ve Wazuh Kullanarak  Mitre ATT&CK Kurallarının ...Windows Sistemler için Sysmon ve Wazuh Kullanarak  Mitre ATT&CK Kurallarının ...
Windows Sistemler için Sysmon ve Wazuh Kullanarak Mitre ATT&CK Kurallarının ...
BGA Cyber Security
 
Information Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your OrganziationInformation Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your Organziation
Seccuris Inc.
 
Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES
Priyanka Aash
 
Ssl Vpn presentation at CoolTech club
Ssl Vpn presentation at CoolTech clubSsl Vpn presentation at CoolTech club
Ssl Vpn presentation at CoolTech club
iplotnikov
 
5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice
AlgoSec
 
Easttom C. Computer Security Fundamentals 5ed 2023.pdf
Easttom C. Computer Security Fundamentals 5ed 2023.pdfEasttom C. Computer Security Fundamentals 5ed 2023.pdf
Easttom C. Computer Security Fundamentals 5ed 2023.pdf
JarellScott
 
cn-series-se-presentation.pptx
cn-series-se-presentation.pptxcn-series-se-presentation.pptx
cn-series-se-presentation.pptx
eli lama sabachtani sinaga
 
Palo alto outline course | Mostafa El Lathy
Palo alto outline course | Mostafa El LathyPalo alto outline course | Mostafa El Lathy
Palo alto outline course | Mostafa El Lathy
Mostafa El Lathy
 
Zero Trust 20211105
Zero Trust 20211105 Zero Trust 20211105
Zero Trust 20211105
Thomas Treml
 

What's hot (20)

Understanding SASE
Understanding SASE Understanding SASE
Understanding SASE
 
Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 16, 17, 18
Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 16, 17, 18Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 16, 17, 18
Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 16, 17, 18
 
FortiGate_Sec_02_Security Fabric (1).pptx
FortiGate_Sec_02_Security Fabric (1).pptxFortiGate_Sec_02_Security Fabric (1).pptx
FortiGate_Sec_02_Security Fabric (1).pptx
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
Metasploit Framework - Giris Seviyesi Guvenlik Denetim Rehberi
Metasploit Framework - Giris Seviyesi Guvenlik Denetim RehberiMetasploit Framework - Giris Seviyesi Guvenlik Denetim Rehberi
Metasploit Framework - Giris Seviyesi Guvenlik Denetim Rehberi
 
Secure Your Salesforce Org with Two-Factor Authentication
Secure Your Salesforce Org with Two-Factor AuthenticationSecure Your Salesforce Org with Two-Factor Authentication
Secure Your Salesforce Org with Two-Factor Authentication
 
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityCybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber Security
 
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSymantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
 
Enterprise Architecture and Information Security
Enterprise Architecture and Information SecurityEnterprise Architecture and Information Security
Enterprise Architecture and Information Security
 
Designing Secure Cisco Data Centers
Designing Secure Cisco Data CentersDesigning Secure Cisco Data Centers
Designing Secure Cisco Data Centers
 
Sample lld document v1.0
Sample lld document v1.0Sample lld document v1.0
Sample lld document v1.0
 
Windows Sistemler için Sysmon ve Wazuh Kullanarak Mitre ATT&CK Kurallarının ...
Windows Sistemler için Sysmon ve Wazuh Kullanarak  Mitre ATT&CK Kurallarının ...Windows Sistemler için Sysmon ve Wazuh Kullanarak  Mitre ATT&CK Kurallarının ...
Windows Sistemler için Sysmon ve Wazuh Kullanarak Mitre ATT&CK Kurallarının ...
 
Information Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your OrganziationInformation Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your Organziation
 
Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES
 
Ssl Vpn presentation at CoolTech club
Ssl Vpn presentation at CoolTech clubSsl Vpn presentation at CoolTech club
Ssl Vpn presentation at CoolTech club
 
5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice
 
Easttom C. Computer Security Fundamentals 5ed 2023.pdf
Easttom C. Computer Security Fundamentals 5ed 2023.pdfEasttom C. Computer Security Fundamentals 5ed 2023.pdf
Easttom C. Computer Security Fundamentals 5ed 2023.pdf
 
cn-series-se-presentation.pptx
cn-series-se-presentation.pptxcn-series-se-presentation.pptx
cn-series-se-presentation.pptx
 
Palo alto outline course | Mostafa El Lathy
Palo alto outline course | Mostafa El LathyPalo alto outline course | Mostafa El Lathy
Palo alto outline course | Mostafa El Lathy
 
Zero Trust 20211105
Zero Trust 20211105 Zero Trust 20211105
Zero Trust 20211105
 

Similar to Fortinet SSL VPN access

How to Change Hostname in CentOS 7 or RHEL 7
How to Change Hostname in CentOS 7 or RHEL 7How to Change Hostname in CentOS 7 or RHEL 7
How to Change Hostname in CentOS 7 or RHEL 7
VCP Muthukrishna
 
Installation and Configuration
Installation and ConfigurationInstallation and Configuration
Installation and Configuration
Daniel Taylor
 
Advanced ETL2 Pentaho
Advanced ETL2  Pentaho Advanced ETL2  Pentaho
Advanced ETL2 Pentaho
Sunny U Okoro
 
developersguide.pdf
developersguide.pdfdevelopersguide.pdf
developersguide.pdf
testgrupocomex
 
developersguide.pdf
developersguide.pdfdevelopersguide.pdf
developersguide.pdf
testgrupocomex
 
developersguide.pdf
developersguide.pdfdevelopersguide.pdf
developersguide.pdf
testgrupocomex
 
developersguide.pdf
developersguide.pdfdevelopersguide.pdf
developersguide.pdf
jcarrey
 
developersguide.pdf
developersguide.pdfdevelopersguide.pdf
developersguide.pdf
jcarrey
 
developersguide.pdf
developersguide.pdfdevelopersguide.pdf
developersguide.pdf
testgrupocomex
 
developersguide.pdf
developersguide.pdfdevelopersguide.pdf
developersguide.pdf
jcarrey
 
developersguide.pdf
developersguide.pdfdevelopersguide.pdf
developersguide.pdf
testgrupocomex
 
developersguide.pdf
developersguide.pdfdevelopersguide.pdf
developersguide.pdf
jcarrey
 
developersguide.pdf
developersguide.pdfdevelopersguide.pdf
developersguide.pdf
testgrupocomex
 
developersguide.pdf
developersguide.pdfdevelopersguide.pdf
developersguide.pdf
testgrupocomex
 
developersguide.pdf
developersguide.pdfdevelopersguide.pdf
developersguide.pdf
testgrupocomex
 
developersguide.pdf
developersguide.pdfdevelopersguide.pdf
developersguide.pdf
testgrupocomex
 
Fedora 17-installation guide-en-us
Fedora 17-installation guide-en-usFedora 17-installation guide-en-us
Fedora 17-installation guide-en-us
nelson-10
 
Batch script for nslookup range of ip address
Batch script for nslookup range of ip addressBatch script for nslookup range of ip address
Batch script for nslookup range of ip address
VCP Muthukrishna
 
Odi installation guide
Odi installation guideOdi installation guide
Odi installation guide
prakashdas05
 
System administration guide
System administration guideSystem administration guide
System administration guide
meoconhs2612
 

Similar to Fortinet SSL VPN access (20)

How to Change Hostname in CentOS 7 or RHEL 7
How to Change Hostname in CentOS 7 or RHEL 7How to Change Hostname in CentOS 7 or RHEL 7
How to Change Hostname in CentOS 7 or RHEL 7
 
Installation and Configuration
Installation and ConfigurationInstallation and Configuration
Installation and Configuration
 
Advanced ETL2 Pentaho
Advanced ETL2  Pentaho Advanced ETL2  Pentaho
Advanced ETL2 Pentaho
 
developersguide.pdf
developersguide.pdfdevelopersguide.pdf
developersguide.pdf
 
developersguide.pdf
developersguide.pdfdevelopersguide.pdf
developersguide.pdf
 
developersguide.pdf
developersguide.pdfdevelopersguide.pdf
developersguide.pdf
 
developersguide.pdf
developersguide.pdfdevelopersguide.pdf
developersguide.pdf
 
developersguide.pdf
developersguide.pdfdevelopersguide.pdf
developersguide.pdf
 
developersguide.pdf
developersguide.pdfdevelopersguide.pdf
developersguide.pdf
 
developersguide.pdf
developersguide.pdfdevelopersguide.pdf
developersguide.pdf
 
developersguide.pdf
developersguide.pdfdevelopersguide.pdf
developersguide.pdf
 
developersguide.pdf
developersguide.pdfdevelopersguide.pdf
developersguide.pdf
 
developersguide.pdf
developersguide.pdfdevelopersguide.pdf
developersguide.pdf
 
developersguide.pdf
developersguide.pdfdevelopersguide.pdf
developersguide.pdf
 
developersguide.pdf
developersguide.pdfdevelopersguide.pdf
developersguide.pdf
 
developersguide.pdf
developersguide.pdfdevelopersguide.pdf
developersguide.pdf
 
Fedora 17-installation guide-en-us
Fedora 17-installation guide-en-usFedora 17-installation guide-en-us
Fedora 17-installation guide-en-us
 
Batch script for nslookup range of ip address
Batch script for nslookup range of ip addressBatch script for nslookup range of ip address
Batch script for nslookup range of ip address
 
Odi installation guide
Odi installation guideOdi installation guide
Odi installation guide
 
System administration guide
System administration guideSystem administration guide
System administration guide
 

More from Naseem Khoodoruth

Azure File Share and File Sync guide (Beginners Edition)
Azure File Share and File Sync guide (Beginners Edition)Azure File Share and File Sync guide (Beginners Edition)
Azure File Share and File Sync guide (Beginners Edition)
Naseem Khoodoruth
 
How to install and use MS Teams for meeting and live events
How to install and use MS Teams for meeting and live eventsHow to install and use MS Teams for meeting and live events
How to install and use MS Teams for meeting and live events
Naseem Khoodoruth
 
How to install and use microsoft teams for beginners
How to install and use microsoft teams for beginnersHow to install and use microsoft teams for beginners
How to install and use microsoft teams for beginners
Naseem Khoodoruth
 
Work from home under the lockdown
Work from home under the lockdownWork from home under the lockdown
Work from home under the lockdown
Naseem Khoodoruth
 
Sophos XG FIREWALL SSL VPN Configuration
Sophos XG FIREWALL SSL VPN ConfigurationSophos XG FIREWALL SSL VPN Configuration
Sophos XG FIREWALL SSL VPN Configuration
Naseem Khoodoruth
 
Powershell direct
Powershell directPowershell direct
Powershell direct
Naseem Khoodoruth
 
Exchange 2010/2013 Exchange Management Shell Command
Exchange 2010/2013 Exchange Management Shell CommandExchange 2010/2013 Exchange Management Shell Command
Exchange 2010/2013 Exchange Management Shell Command
Naseem Khoodoruth
 
Basic command for Time sync (Domain Controllers)
Basic command for Time sync (Domain Controllers)Basic command for Time sync (Domain Controllers)
Basic command for Time sync (Domain Controllers)
Naseem Khoodoruth
 
Implementation of Scom 2016
Implementation of Scom 2016 Implementation of Scom 2016
Implementation of Scom 2016
Naseem Khoodoruth
 
Sophos_XG_Firewall_Certified_Engineer v15.0
Sophos_XG_Firewall_Certified_Engineer v15.0Sophos_XG_Firewall_Certified_Engineer v15.0
Sophos_XG_Firewall_Certified_Engineer v15.0
Naseem Khoodoruth
 
Backup Exec 15 VSEPlus
Backup Exec 15 VSEPlusBackup Exec 15 VSEPlus
Backup Exec 15 VSEPlus
Naseem Khoodoruth
 
Backup Exec 15 VSE
Backup Exec 15 VSEBackup Exec 15 VSE
Backup Exec 15 VSE
Naseem Khoodoruth
 
CP250915V3.1EL14818
CP250915V3.1EL14818CP250915V3.1EL14818
CP250915V3.1EL14818
Naseem Khoodoruth
 
DSST0214WBTS - Dell Support Services training.PDF
DSST0214WBTS - Dell Support Services training.PDFDSST0214WBTS - Dell Support Services training.PDF
DSST0214WBTS - Dell Support Services training.PDF
Naseem Khoodoruth
 
MCSA Office 365
MCSA Office 365MCSA Office 365
MCSA Office 365
Naseem Khoodoruth
 

More from Naseem Khoodoruth (15)

Azure File Share and File Sync guide (Beginners Edition)
Azure File Share and File Sync guide (Beginners Edition)Azure File Share and File Sync guide (Beginners Edition)
Azure File Share and File Sync guide (Beginners Edition)
 
How to install and use MS Teams for meeting and live events
How to install and use MS Teams for meeting and live eventsHow to install and use MS Teams for meeting and live events
How to install and use MS Teams for meeting and live events
 
How to install and use microsoft teams for beginners
How to install and use microsoft teams for beginnersHow to install and use microsoft teams for beginners
How to install and use microsoft teams for beginners
 
Work from home under the lockdown
Work from home under the lockdownWork from home under the lockdown
Work from home under the lockdown
 
Sophos XG FIREWALL SSL VPN Configuration
Sophos XG FIREWALL SSL VPN ConfigurationSophos XG FIREWALL SSL VPN Configuration
Sophos XG FIREWALL SSL VPN Configuration
 
Powershell direct
Powershell directPowershell direct
Powershell direct
 
Exchange 2010/2013 Exchange Management Shell Command
Exchange 2010/2013 Exchange Management Shell CommandExchange 2010/2013 Exchange Management Shell Command
Exchange 2010/2013 Exchange Management Shell Command
 
Basic command for Time sync (Domain Controllers)
Basic command for Time sync (Domain Controllers)Basic command for Time sync (Domain Controllers)
Basic command for Time sync (Domain Controllers)
 
Implementation of Scom 2016
Implementation of Scom 2016 Implementation of Scom 2016
Implementation of Scom 2016
 
Sophos_XG_Firewall_Certified_Engineer v15.0
Sophos_XG_Firewall_Certified_Engineer v15.0Sophos_XG_Firewall_Certified_Engineer v15.0
Sophos_XG_Firewall_Certified_Engineer v15.0
 
Backup Exec 15 VSEPlus
Backup Exec 15 VSEPlusBackup Exec 15 VSEPlus
Backup Exec 15 VSEPlus
 
Backup Exec 15 VSE
Backup Exec 15 VSEBackup Exec 15 VSE
Backup Exec 15 VSE
 
CP250915V3.1EL14818
CP250915V3.1EL14818CP250915V3.1EL14818
CP250915V3.1EL14818
 
DSST0214WBTS - Dell Support Services training.PDF
DSST0214WBTS - Dell Support Services training.PDFDSST0214WBTS - Dell Support Services training.PDF
DSST0214WBTS - Dell Support Services training.PDF
 
MCSA Office 365
MCSA Office 365MCSA Office 365
MCSA Office 365
 

Recently uploaded

UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 

Recently uploaded (20)

UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 

Fortinet SSL VPN access