Fortinet
Fortinet is a global leader and innovator in Network Security. Our mission is to deliver the most innovative, highest performing network security platform to secure and simplify your IT infrastructure. We are a provider of network security appliances and security subscription services for carriers, data centers, enterprises, distributed offices and MSSPs. Because of constant innovation of our custom ASICs, hardware systems, network software, management capabilities and security research, we have a large, rapidly growing and highly satisfied customer base, including the majority of the Fortune Global 100, and we continue to set the pace in the Network Security market. Our market position and solution effectiveness has been widely validated by industry analysts, independent testing labs, business organizations, and the media worldwide. Our broad product line of complementary solutions goes beyond Network Security to help secure the extended enterprise.
Fortinet is headquartered in Sunnyvale, California, with offices around the world. Founded in 2000 by Ken Xie, the visionary founder and former president and CEO of NetScreen, Fortinet is led by a strong and seasoned management team with deep experience in networking and security. For more information, visit our website at www.fortinet.com
-
02:27 Popular
FortiGate Cookbook - Creating A Security Policy To Identify Users
Added 376 Views / 0 LikesEnable FortiGate user authentication by creating a user group named Sales and adding a user named wloman to this group. Then add an identity based policy to a security policy that accepts connections from the internal network to the Internet. Add the Sale
Featured -
07:59 Popular
FortiGate (PPTP VPN) (v5.0.2)
Added 376 Views / 0 LikesFortiGate ile nasıl PPTP VPN yapılır ? RZK Mühendislik ve Bilgisayar Sistemleri
Featured -
03:56 Popular
FortiGate Cookbook - Basic Firewall Configuration (5.0)
Added 373 Views / 0 LikesIn this video, you're going to learn how to perform basic firewall configuration, creating addresses, policies, and security profiles. You can use firewall policies and security profiles to secure network user traffic and limit it to approved services and
Featured -
04:55 Popular
FortiGate Cookbook - Captive Guest Portal (5.0)
Added 373 Views / 0 LikesIn this video, you're going to learn how to set up a captive guest portal for wifi users. A captive portal brings security (or access control) to an otherwise open wireless network. To allow visitors to access your wireless network and internet, you can c
Featured -
08:48 Popular
FortiGate Cookbook - VDOM Configuration (5.2)
Added 370 Views / 0 LikesIn this video, you will learn how use Virtual Domains or VDOMs to host two FortiOS instances on a single FortiGate unit. Virtual Domains (VDOMS) can be used to divide a single FortiGate unit into two or more virtual instances of FortiOS. These instances f
Featured -
02:36 Popular
FortiGate Cookbook - Explicit Web Proxy (5.0)
Added 370 Views / 0 LikesIn this video, you're going to learn how to set up the FortiGate Explicit Web Proxy to allow users on your internal network to browse the web through a web proxy. By also enabling web caching for web proxy users, you can speed up web browsing for your use
Featured -
04:34 Popular
FortiGate Cookbook - FSSO Polling Using Windows AD (5.2)
Added 367 Views / 0 LikesIn this video, you will learn how configure Fortinet Single Sign On directly in the security policy using the new FSSO wizard, introduced in FortiOS 5.2.2. Visit Fortinet's documentation library at http://docs.fortinet.com or our video portal at http://vi
Featured -
02:38 Popular
FortiGate Cookbook BYOD Scheduling 5 0 01 21
Added 367 Views / 0 Likeshttps://plus.google.com/+charlyprudent/ nosql-database.org www.couchbase.com http://www.network-engineer.usa.cc http://www.crunchbase.com/person/charly-prudent https://github.com/charlyprudent
Featured -
00:27 Popular
Hidex Demo 2: Invoking A Hidden Method In DEX Executables
Added 365 Views / 0 LikesThe demo shows a PoC application where a hidden method named "thisishidden()" is successfully called by the application. This was presented at conferences Hacktivity and Hack.Lu in Octoboer 2013 More details at : http://www.fortiguard.com/paper/Playing-Hi
Featured -
05:59 Popular
FortiGate Cookbook YouTube For Education Filter 5 0
Added 364 Views / 0 LikesFeatured -
02:30 Popular
A Working Demonstration Of AndroRat With Audio
Added 364 Views / 0 LikesMore details can be found at the related blog post : http://blog.fortinet.com/Mobile-RAT-Infestation/ Video by : Ruchna Nigam Voice : Patrick Grillo
Featured -
04:17 Popular
Positioning And Selling Fortinet Solutions
Added 364 Views / 0 LikesShannon Curran, Regional Major Accounts Director for the Caribbean and Central America at Fortinet, explains the value proposition and benefits of having integrated solutions and security architectures that effectively simplify Cybersecurity processes for
Featured -
05:26 Popular
FortiGate Cookbook - User/Device Scheduling (5.2)
Added 362 Views / 0 LikesIn this video, you will learn how to create schedules that restrict internet access based on time and user account info, allowing you more control over what content users can access and how much bandwidth is used. This example involves a full-time employe
Featured -
41:22 Popular
Fortinet Training Demo By LearningLynk
Added 362 Views / 0 LikesFortinet Training Demo by LearningLynk Fortinet Training Demo by LearningLynks India Ltd, LearningLynk Training videos for more details visit: http://www.learninglynk.com/ linke us on facebook: https://www.facebook.com/LearningLynk call us at: +91-8686348
Featured -
03:20 Popular
FortiGate Cookbook Blocking Oversize File Downloads 5 0
Added 361 Views / 0 LikesFeatured -
05:11 Popular
FortiGate Cookbook - Basic Application Control (5.2)
Added 360 Views / 0 LikesIn this video, you will use application control to track applications on your network and enhance security by restricting certain applications. The FortiGate database categorizes applications by Category, Technology, Popularity and Risk. In this example,
Featured -
06:04 Popular
FortiGate Cookbook - Remote Browsing With VPN (5.2)
Added 359 Views / 0 LikesIn this video, you will learn how to use remote IPsec and SSL VPN tunnels to bypass internet access restrictions. A VPN tunnel is an encrypted traffic passage between two endpoints. In this example, the VPN tunnel is between a local user running FortiClie
Featured