High Performance Network Security, Enterprise and Data-Center Firewall

High Performance Network Security, Enterprise and Data-Center Firewall

by RSS Glen Kemp  |  March 09, 2016  |  Category: Security 101
Firewall deployments can be characterised by episodes of intense activity interspersed with long periods of “I assume it’s working ok”. However, between the cutover and Business as Usual (BAU) transition the long term feed and water...
by RSS Glen Kemp  |  April 06, 2015  |  Category: Security 101
Deploying new firewalls in a greenfield environment is a fairly straightforward task. However, replacing an existing solution with new firewalls is more challenging. Sadly it’s not quite a case of plug and play; the existing environment will al...
by RSS Victoria Martin  |  January 28, 2015  |  Category: Security 101
The FortiGate Cookbook website, found at cookbook.fortinet.com, was launched at the end of 2014. You can now enjoy the Cookbook, and all its step-by-step recipes for using a FortiGate, in a whole new way. If you want to jump right to the website, go...
by RSS Stefanie Hoffman  |  April 10, 2014  |  Category: Security 101
All one has to do is take a look at the latest headlines to know that Distributed Denial of Service (DDoS) attacks are becoming increasingly commonplace in the enterprise environment. But that doesn't make them any less of a threat. In fact, quite th...
by RSS Stefanie Hoffman  |  March 27, 2014  |  Category: Security 101
Imagine configuring and securing a network blindfolded. Safe to say, that's just shy of a completely impossible task. But when IT administrators don't have a comprehensive view of the network, they are essentially doing just that. That lack of visib...
by RSS Hemant Jain  |  March 21, 2014  |  Category: Security 101
In a recent post we explored the Myths about DDoS. Despite their infamy, many misconceptions surround the world of DDoS but now that you know the facts let's go one step further. Typical internet security appliances come prepackaged with signatures a...
by RSS Michael Perna  |  March 17, 2014  |  Category: Security 101
We are in the age of information and for the past 25 years the internet has been an awesome force for good. It has created an incredible information economy across networks and won our trust as a viable platform for the exchange of just about anythin...
by RSS Michael Perna  |  March 07, 2014  |  Category: Security 101
Last month we explored the History of Distributed Denial of Service (DDoS) Attacks and how they have developed over time. DDoS attacks are one of the most fundamental and their use in disrupting services online has been unabated since the early 1970'...
by RSS Michael Perna  |  February 05, 2014  |  Category: Security 101
In 1974 a 13-year old boy named David Dennis discovered that he could lock up a PLATO terminal by making an external request when no external device was present. This prompted David, a student at University High school in Champaign Illinois, to write...
by RSS Michael Perna  |  February 03, 2014  |  Category: Security 101
Cryptography has been around for a while, which is a bit of an understatement. Below is an infographic that will give a glimpse into the world of cryptography.
by RSS Chris McKie  |  January 15, 2014  |  Category: Security 101
Federal and State laws, as well as industry regulations, are major drivers in the security industry, and none are probably more far-reaching and controversial than the Payment Card Industry Data Security Standard (PCI DSS). Here, Fortinet provides a...
by RSS Stefanie Hoffman  |  December 04, 2013  |  Category: Security 101
You get a message in your inbox that appears to be from the popular online retailer Amazon.com, claiming that there was an error with your recent order. All you have to do is confirm who you are with login credentials or a credit card number, and the...
by RSS Stefanie Hoffman  |  November 26, 2013  |  Category: Security 101
VPN - for organizations with a remote and traveling workforce, it's a necessary feature of network security. Almost everyone who has logged into their organization's network from outside the corporate firewall has likely had to navigate a VPN connect...
by RSS David Finger  |  November 19, 2013  |  Category: Security 101
A psychologist might tell you that the way a child plays in the sandbox is a reflection of how they will act in their adult life. The same is true for malicious software, though we aren't speaking about the same sandbox. There is a growing concern a...

FortiGuard Labs on the Web

search results hidden links