Video Library
Configure IPSec VPN
Configure FortiGate and FortiClient (v5.0.2) IPSec VPN for Secure Remote Access to Work Network
All Videos 禄
All Years | |
---|---|
Security Gate & Gi Firewall - Protecting the Mobility Infrastructure This white paper introduces the components and architecture of a secured LTE network implementation. It also explains why FortGate consolidated security platforms is best suited for carriers and service providers seeking a SeGW solution for their mobility networks. |
2013 |
Threats on the Horizon: The Rise of the Advanced Persistent Threat This Fortinet whitepaper (with executive summary) explores a number of highly targeted attacks and establishes common stages shared by many such attacks before delving into the range of measures- across product, people and process- an organization should consider to reduce its risk related to this emerging class of threat. |
2013 |
SANS Analyst Whitepaper: Real-World Testing of Next-Generation Firewalls This analyst whitepaper will help you determine which solution is best for your organization. It highlights: Recent trends in the threat landscape and recommended countermeasures, Essential capabilities to consider in a next generation firewall and How to define requirements for your organization, and test for them. |
2013 |
FortiGuard Midyear Threat Report This report highlights the most active threats our lab has analyzed in the last six months, new mobile malware data, an in-depth look at the recent S. Korean cyber attack and more. |
2013 |
The Fortinet Secure Health Architecture This white paper will highlight the Fortinet secure health architecture, as well as describe how to provide end-to-end security for modern healthcare organizations. It will highlight shifts in the industry and discuss Fortinet鈥檚 security approach and various options Fortinet has available between its strategies and products. |
2013 |
Comprehensive Email Security for Enterprises and Service Providers This white paper details the FortiMail Email Security platform and how it can be deployed to help protect your email servers against the evolving threat landscape. |
2013 |
FortiMail Identity Based Encryption This document details how email communications can be quickly and simply secured with zero impact to the internal users and no requirement for complicated client software or encryption keys to be shared with the recipient. |
2013 |
UTM in Education This paper will investigate many of the key challenges that universities and institutions of higher education face when attempting to secure their systems. It will discuss industry best practices designed to secure key systems such as databases and the network. Finally, this paper will discuss Fortinet鈥檚 unified approach to security, showing that UTM provides a cost-effective solution to increasing security for educational institutions. |
2013 |
Secure Wireless LAN Solutions This paper is intended for CIOs and CISOs in the retail industry. Maintaining compliance with PCI DSS is a top concern as there are significant effects on business operations, payment card transactions, organizational security and data protection. |
2013 |
Anatomy of a Botnet Report One of the greatest challenges in Internet security today is how to contain the global scourge that is the botnet. Botnet authors and their criminal organizations are continuously developing innovative ways to recruit new victims into their networks and monetize them. |
2013 |
Real-World Network Security Performance Testing NSS Labs' 2013 group firewall test evaluated competing products' ability to provide high performance security and low latency. See how well the FG-800C performed in real-world tests. |
2013 |
Fortinet recognized for delivering outstanding enterprise management, security effectiveness, and TCO Fortinet鈥檚 FortiGate 800C Excels in NSS Labs 2013 Group Firewall Test to Earn Highest "Recommend" Rating with Very High Security Effectiveness and Very Low TCO |
2013 |
Distributed Enterprise Solutions See how Fortinet can provide the end-to-end, multi-layer security that retailers need to securely deliver a new breed of services for the customers and improve their own bottom line. |
2013 |
Cutting Edge Security and Performance - 5001C is a Clear Choice Fortinet allows MSSPs to deliver cutting edge security technologies to SMBs, while preserving their margin requirements and addressing broader markets. Through higher performance products like the 5001C blade and innovative approaches in providing security services such as using multi-tenant VDOMs, Fortinet gives providers the flexibility to grow their businesses into green field opportunities that are unreachable using any other equipment provider. |
2013 |
Fortinet 2013 Cybercrime Report This paper explores the world of the cybercriminal, describes how they build and deploy attacks to harvest valuable data, and what you can do to fight back. |
2012 |
The Power To Secure The Cloud How Fortinet protects your data as it flows to and from the cloud |
2012 |
Pragmatic WAF Management: Giving Web Apps a Fighting Chance Securosis鈥 鈥淧ragmatic WAF Management: Giving Web Apps a Fighting Chance鈥 discusses how to effectively use a web application firewall (WAF) for countering application threats and mitigate application vulnerabilities. |
2012 |
FortiOS 5 List of New Features & Enhancements FortiOS 5 contains over 150 new features and enhancements. These are grouped into 25 different categories; including Client Reputation, User-Based Identity, User Notification, IPv6 and Antivirus enhancements. |
2012 |
The Importance of Client Reputation This paper will examine the changing network threat landscape and the move from static to dynamic security. It introduces Fortinet鈥檚 newest client reputation functionality in FortiOS 5.0 Advanced Security Operating System. This functionality allows granular controls to evaluate what users are doing and if those actions might be part of a larger threat to the organization. |
2012 |
ROI of FortiGate Fortinet technology provides you with business and security returns at a substantially lower cost. IANS Security Research conducted an Information Security Investment Analysis (ISIA) of Fortinet's unified threat management (UTM) solutions, interviewing Guess, Inc., an active Fortinet customer. |
2012 |
NSS Labs 2012 Intrusion Prevention Systems Security Value Map FortiGate-3240C delivers IPS protection, performance, and low TCO to earn NSS Labs鈥 鈥淩ecommended鈥 rating. |
2012 |
Protecting against DoS/DDoS Attacks with FortiWeb漏 Web Application Firewall The white paper discusses today鈥檚 organization challenges having to deal with the rise in application layer DDoS attacks, the use of botnets in these attacks and the need for an integrated solution to protect against these attacks. |
2012 |
FortiGate-3950B Demonstrates Highest Appliance Throughput and Resiliency in BreakingPoint鈩 Tests Resiliency testing measures the performance of a given firewall under stressful and varying conditions. The BreakingPoint Resiliency Score鈩 is an automated test based on industry standards for performance, security, and stability of network and security devices. Fortinet recently conducted rigorous resiliency testing on the FortiGate庐-3950B, using multiple BreakingPoint鈩 Elite chassis in different configurations in order to simulate real-world deployment. The FortiGate-3950B passed with an overall BreakingPoint score of 95/100 - the highest score on record. |
2012 |
Unified Threat Management (UTM) for Dummies Learn how UTM gives you the power to control your applications and devices, improve network security and performance, and consolidate the management of essential security technologies. |
2012 |
ICSA - Compliance, Incentives and Penalties: Hot Topics in US Health IT Download the ICSA whitepaper to get a better understanding of some of the most noteworthy requirements for security in the USA鈥檚 Healthcare Provider IT market including PCI, HIPAA鈥揃AA and ARRA鈥揌ITECH (HIPAA II)-covered entity. |
2011 |
Next Generation Security for Enterprise Networks Enterprises and service providers are deploying Next-Generation Firewalls in an effort to control web-based applications and block new blended network threats. Some Next-Generation Firewalls fail to include important next-generation features as well as adequate traditional network protections. This white paper defines the security features needed in a 'next-generation security' platform. |
2011 |
Towards a Consolidated Approach for PCI-DSS Compliance Over the past five years, the PCI-DSS framework has evolved from being mere guidelines without enforceable sanctions to a 鈥榤ust-have鈥 certification that you are required to obtain if you are involved in manipulating, storing or transmitting cardholder data. This white paper discusses how a consolidated approach to security can assist in PCI compliance. |
2011 |
Real Time Network Protection for Educational Institutions Discuses the challenges of protecting today's educational networks and the need for a new, cost-effective and architecturally different approach for distributed and diverse educational network and computing environments. |
2011 |
A Practical Guide for Beginning the Migration to IPv6 Describes the importance of securing the network against IPv6 threats well before the introduction of any IPv6 traffic, and outlines the steps involved to begin securing a transitional IPv4/IPv6 network. |
2011 |
The Need for Secure Communications in a Distributed Environment Discusses the challenges of protecting distributed environments and the need for network security systems that are designed to work together in a unified manner. |
2011 |
Understanding How File Size Affects Malware Detection Offers insight on how malware inspection performance is related to the size of malware-infected files and how different scanning methods can help to strike a balance between performance and security. |
2011 |
Web Filtering: An Essential Part of a Consolidated Security System Discuses the challenges of protecting enterprise networks with a layered defense employing multiple security technologies to protect against malicious content, sites, and other web-borne threats. |
2011 |
Accelerating Unified Threat Management with Specialized Hardware Provides a brief overview of the evolution of UTM platforms and explains why corporate IT departments are deploying specialized hardware to keep pace with new security threats and ever-faster enterprise networks. |
2011 |
FortiGate DoS Protection - Block Malicious Traffic Before It Affects Critical Applications and Systems Describes common DoS techniques, explains the technology integrated into every FortiGate consolidated security platform that helps in blocking DoS attacks, and offers suggestions on how to prevent an organization鈥檚 network from being used to attack another organization |
2011 |
Controlling Web 2.0 Applications in the Enterprise Describes the threats found in Web 2.0 applications, and how organizations need to deploy new methods of monitoring and controlling these Internet-based applications in order to discover and mitigate hidden security threats. |
2011 |
Securing SCADA Infrastructure Discusses how to protect Supervisory Control and Data Acquisition, or SCADA systems (specialized computer networks and devices that work in concert to monitor and control key processes involved in the management of machinery, equipment and facilities). |
2010 |
Vulnerability Management for the Distributed Enterprise Describes the challenges large distributed enterprises face in deploying vulnerability management technology in dozens, hundreds, or even thousands of remote locations, and Fortinet's solutions. |
2010 |
Migrating to a FortiGate Firewall Describes the best practices for performing firewall migrations, the benefits a migration process can achieve, and steps to take to ease the migration process itself. |
2010 |
PCI Retail Audit Readiness Highlights top reasons for assessment failure or security breach, and outlines a better way to secure your payment card infrastructure utilizing a UTM approach with an integrated Vulnerability Management (VM) strategy within an ISO/IEC 27001/2 Information Security Management System (ISMS) framework. |
2010 |
FortiWeb Web Application Firewall: Ensuring Compliance for PCI DSS 6.5 and 6.6 Discusses the challenges organizations face in meeting PCI DSS 6.5 and 6.6 requirements, and how FortiWeb Web Application Firewall can address those challenges. |
2010 |
Global Reputation Monitoring: The FortiGuard Security Intelligence Database Describes how Fortinet鈥檚 FortiGuard Security Services delivers two essential services to Fortinet customers: Blocking spam emails before they reach customers鈥 mailboxes and blocking customers鈥 access to malicious web sites. |
2010 |
With Fortinet, we can deliver our customers various combinations of security functions as a real-time service - all from a single appliance. What the end customer experiences is a seamless, effective and reliable choice of security services, while we enjoy the best potential returns from our business model with a platform that can scale as our customer base grows.