Arrow down
arrow down
Arrow down
Arrow down
Arrow down

Visit our Hacker Den at Black Hat USA

Forward Networks | Booth 3017 | Aug 7-8, 2024

Meet our Network Security experts

Commercial or federal networks, these guys know their stuff

Mike Lossmann

Technical Marketing Engineer
Mike Lossman
Mike is an experienced IT professional with more than 18 years of expertise in Wide Area Networking and SD-WAN. Mike has seen it all in the industry, from working for a “big four” consulting company as a technology consulting manager, an SD-WAN Solutions Architect, and a Network Architect for several Fortune 150 companies. Currently, he holds the position of Technical Product Marketing Manager at Forward Networks
Watch Mike Lossmann demo video

Scot Wilson

Federal Technical Solutions Architect
Scot Wilson
Scot Wilson specializes in pre-sales engineering for the federal market. Prior to joining Forward Networks, Scot was a Senior Director for the Advanced TechnologyGroup at Riverbed Technology. He has also held leadership positions at Cisco, United States Air Force, and General Dynamics Information Technology (GDIT). Scot holds an MBA from Penn State University, and a BS, Computer Science from Georgia Institute of Technology.
Watch Scot WIlson demo video

Think you know about Hackers?

Put your cyber-thriller movie trivia knowledge to the test

Welcome to your Black Hat Quiz

Which is one of the aliases of the main character, Dade Murphy?

Which real-world hacker or hacking incident does the movie draw inspiration from?

What is the name of the computer program designed to steal small amounts of money from multiple transactions?

Which is one of the systems Dade hacks into at his high school?

What is the name of the television show that Phreak and Cereal Killer watch, where the term "Gibson" is mentioned, referring to a high-tech security system?

Which video game does Dade win against Kate, when they meet at Cyberdelia?

When the gang is quizzing Dade on the rainbow of books, who is the ugly pink shirt guy on the cover of one of the books?

The Phantom Phreak calls himself the 'King of NYNEX'. What is he referring to?

Lord Nikon has a photographic memory. How good is yours? What's the name of the woman whose phone number he remembers at the party?

How many computers did Dade Murphy crash in 1988, "the biggest crash in history"?

What analysts are saying about Forward Networks

How Global Companies Master Multi-Cloud Management & Prove Security Compliance

Watch the webinar

CISOs and Security Executives: Network Security: Multiple Challenges Underline Need for Increased Visibility and Verification

Read the report

SecOps Practitioners: Siloed and Poorly Integrated Systems Continue to Undermine Network Security

Read the report

What cutomers are saying about Forward Networks

Ensuring that the security posture is in line with what it is designed to be. A risk benefit is a business benefit for our organization. Forward Networks enables quicker time to market across the market, with new functionalities, new customers we’re onboarding,
new counterparties we need to connect to — there are efficiencies across all of these. Largely, we are able to avoid IT for IT’s sake.”
Read the Solution Brief
“Our organization wanted to get better change prediction and change assurance overall. We needed a mechanism to make sure our policy matched the control points in our network. Forward Networks delivered a model, a graph of the network, illustrating where the control
points are.”
Read the Business Value Report

Deep dive into technology and value

Why Network Verification Requires a Mathematical Model

Network verification is a rapidly emerging technology that is a key part of digital twin technology. Full feature verification solutions require an underlying mathematical model of network behavior to analyze and reason about policy objectives...
Read the whitepaper >>

ROI of a Digital Twin

The financial return on aligning your team, simplifying troubleshooting and avoiding outages
Read the ebook >>

Popular posts on the Forward blog

…. and now, Security Too

On June 28, we announced new features within Forward Enterprise that help security engineers spend less time on reactive tasks so they can be more proactive. Why would a networking company expand into the security space?  Good question.  Let me share some of the reasoning that led to expanding deeper into this space, and why I am excited […]

Read the blog
Zero Trust … But Verify: 5 Ways a Digital Twin Streamlines Zero Trust Initiatives

In today’s cybersecurity landscape, Zero Trust is no longer just an option—it’s a necessity. The U.S. Department of Defense (DoD) and the Cybersecurity and Infrastructure Security Agency (CISA) both emphasize the importance of this model through comprehensive strategies like the DoD Zero Trust Strategy and Capability Execution Roadmap. These frameworks guide private sector and federal […]

Read the blog
Your Network Data Is Gold — Uncover It Faster With Forward Networks’ NQE

Your network, security, and cloud teams spend a lot of time and energy trying to extract timely insights from your enterprise network data, so your organization stays on top of risks and continually improves network performance. But what if they could quickly search your network environment like a database to better understand everything in it […]

Read the blog

You won't wanna miss this

Our field engineers are ready to give you custom recommdations for your unique security, cloud, and network operations challenges. Fill in the form below to book a time that works for you.

What's it like at a Forward Networks event?

Watch our YouTube shorts
Video not playing? Adjust your cookie settings located in the lower left of your screen. Then refresh the page.
The most important things we learned at Cisco Live EMEA 2023Visit Stand E08 at Cisco Live EMEACisco Live Forward Networks Tech Field Day 2024Cisco Live US 2024 Robot Pinball Machine Future of Networking Booth
Top file-emptybookcrossarrow-right Code Snippet ma-gdpr-youtube 1.5.0