Fortinet
Fortinet is a global leader and innovator in Network Security. Our mission is to deliver the most innovative, highest performing network security platform to secure and simplify your IT infrastructure. We are a provider of network security appliances and security subscription services for carriers, data centers, enterprises, distributed offices and MSSPs. Because of constant innovation of our custom ASICs, hardware systems, network software, management capabilities and security research, we have a large, rapidly growing and highly satisfied customer base, including the majority of the Fortune Global 100, and we continue to set the pace in the Network Security market. Our market position and solution effectiveness has been widely validated by industry analysts, independent testing labs, business organizations, and the media worldwide. Our broad product line of complementary solutions goes beyond Network Security to help secure the extended enterprise.
Fortinet is headquartered in Sunnyvale, California, with offices around the world. Founded in 2000 by Ken Xie, the visionary founder and former president and CEO of NetScreen, Fortinet is led by a strong and seasoned management team with deep experience in networking and security. For more information, visit our website at www.fortinet.com
-
01:38 Popular
"Flashback" Mac Malware
Added 478 Views / 0 LikesGuillaume Lovet en conversation avec Radio Classique sur le sujet du malware "Flashback" pour les Macs Guillaume Lovet in conversation with Radio Classic on the subject of the "Flashback" Mac Malware
Featured -
01:31 Popular
FortiGate Cookbook - Limiting The Types Of Web Sites Users Can Visit
Added 477 Views / 0 LikesConfigure FortiGuard Web Filtering to block access to websites that consume excessive network bandwidth.
Featured -
06:40 Popular
Using Zones To Save Your Sanity
Added 476 Views / 0 LikesUsing zones in FortiOS on a FortiGate to save your sanity in complex environments.
Featured -
04:26 Popular
IPsec VPN Two Factor Auth With FortiToken 5 4
Added 471 Views / 0 LikesFortinet made a pretty good video explaining how to setup IPSEC VPN's with two factor authentication when using FortiToken 5.4 Check out the video and be sure to check out http://www.fortinetguru.com for the best tips on Fortinet Hardware and how to utili
Featured -
05:46 Popular
What's New In FortiOS 5.4
Added 470 Views / 0 LikesHello! This is FortiOS Version 5.4. We've been working hard to get this new version ready, and this video will run you through some of the features and updates you can expect: a new interface, new tools for keeping an eye on your network, new features to
Featured -
04:32 Popular
FortiClient EMS Integration With The Fortinet Security Fabric Demo
Added 466 Views / 0 LikesExplore FortiClient Next-Generation Endpoint Protection: https://www.fortinet.com/products/endpoint-security/forticlient.html See how FortiClient strengthens Endpoint security: https://www.youtube.com/watch?v=3DbyK0FSu80 Read the FortiClient data sheet: h
Featured -
03:32 Popular
FortiGate Cookbook FortiGate And FortiAP 5 0 720p
Added 465 Views / 0 Likestest
Featured -
05:20 Popular
FortiGate Cookbook - Protect Web Server DMZ (5.2)
Added 465 Views / 0 LikesIn this video, you will learn how to configure a DMZ network to protect a public web server from unauthorized access. A DMZ network is a secure network connected to the FortiGate that only grants access if it has been explicitly allowed. In this example t
Featured -
05:00 Popular
Cookbook - IPsec VPN W/ Native OSX Client (5.2)
Added 464 Views / 0 LikesIn this video, you will learn how to set up IPsec VPN between a FortiGate and a MAC using the default MAC client. This VPN configuration allows Mac users to securely access an internal network, and browse the Internet through the VPN tunnel. This configur
Featured -
11:38 Popular
Basic FortiGate Configuration On FortiOS 5.4.x
Added 462 Views / 0 LikesA stream of concious video explaining the basic configuration steps of a FortiGate/FortiWIFI 61E. Check out http://www.fortinetguru.com/category/how-to/ for more how to videos as it relates to Fortinet devices!
Featured -
10:12 Popular
Part 1: Controlling Web 2.0 Applications And Preventing Data Loss With FortiGate
Added 460 Views / 0 LikesControlling Web 2.0 Applications and Preventing Data Loss with FortiGate Part 1 Created by Jason Clark & Rodney Mock
Featured -
07:38 Popular
Fortinet Stories Episode 1: The FortiGate
Added 459 Views / 0 LikesIn this episode of Fortinet Stories, Fiona helps Nathan get started with his FortiGate. Learn about the FortiGate here: http://www.fortinet.com/products/fortigate/index.html You can get FortiExplorer here: http://www.fortinet.com/resource_center/product_d
Featured -
03:41 Popular
FortiGate Cookbook - Two-Factor Auth W/ SSL And FortiToken (5.0)
Added 458 Views / 0 LikesIn this video, you're going to learn how to set up two-factor authentication for an SSL VPN user, using FortiToken. An SSLVPN connection can use two-factor user authentication for enhanced security, requiring the user to present a secondary credential to
Featured -
11:39 Popular
Simple Remote Access IPSec Tunnel
Added 457 Views / 0 LikesHow to create a simple remote access IPSec tunnel (Split Tunnel Mode) to allow remote access to your network. Check http://www.fortinetguru.com/category/how-to/ for more how tos
Featured -
03:55 Popular
FortiGate Cookbook Basic Firewall Configuration 5 0 01 21
Added 456 Views / 0 Likeshttps://plus.google.com/+charlyprudent/ nosql-database.org www.couchbase.com http://www.network-engineer.usa.cc http://www.crunchbase.com/person/charly-prudent https://github.com/charlyprudent
Featured -
03:41 Popular
FortiGate Cookbook - Security Policies That Limit DNS Queries To Only One Approved DNS Server
Added 455 Views / 0 LikesCreate FortiGate security policies that block all DNS sessions except for sessions to the approved DNS server.
Featured -
05:05 Popular
FortiGate Cookbook - IPsec VPN W/ Overlapping Subnets (5.2)
Added 454 Views / 0 LikesIn this video, you will learn how to construct a site-to-site IPsec VPN connection between two networks with overlapping subnets. Without the proper configuration, connecting two networks with overlapping subnets can lead to IP conflicts and traffic error
Featured