Fortinet
Fortinet is a global leader and innovator in Network Security. Our mission is to deliver the most innovative, highest performing network security platform to secure and simplify your IT infrastructure. We are a provider of network security appliances and security subscription services for carriers, data centers, enterprises, distributed offices and MSSPs. Because of constant innovation of our custom ASICs, hardware systems, network software, management capabilities and security research, we have a large, rapidly growing and highly satisfied customer base, including the majority of the Fortune Global 100, and we continue to set the pace in the Network Security market. Our market position and solution effectiveness has been widely validated by industry analysts, independent testing labs, business organizations, and the media worldwide. Our broad product line of complementary solutions goes beyond Network Security to help secure the extended enterprise.
Fortinet is headquartered in Sunnyvale, California, with offices around the world. Founded in 2000 by Ken Xie, the visionary founder and former president and CEO of NetScreen, Fortinet is led by a strong and seasoned management team with deep experience in networking and security. For more information, visit our website at www.fortinet.com
-
05:20 Popular
FortiGate Cookbook - Protect Web Server DMZ (5.2)
Added 264 Views / 0 LikesIn this video, you will learn how to configure a DMZ network to protect a public web server from unauthorized access. A DMZ network is a secure network connected to the FortiGate that only grants access if it has been explicitly allowed. In this example t
-
04:12 Popular
FortiGate Cookbook - Logging W/ FortiCloud (5.2)
Added 264 Views / 0 LikesIn this example, you will use FortiCloud, an online logging service provided by Fortinet, to store the logs of your FortiGate unit’s traffic. You will also access logs using the FortiCloud website: http://www.forticloud.com/. Before you can use FortiCloud
-
04:38 Popular
FortiGate Cookbook - Web Rating Overrides (5.2)
Added 262 Views / 0 LikesIn this video, you will learn how to override a website’s FortiGuard Category rating. FortiGuard Categories are up-to-date lists of websites, which you can use to easily filter certain types of content. By overriding a site’s web rating, you can block a w
-
02:48 Popular
FortiGate Cookbook - Protecting A Web Server With DMZ (5.0)
Added 262 Views / 0 LikesIn this video, you're going to learn how to configure a DMZ network to protect a public web server from unauthorized access. A DMZ Network (from the term 'demilitarized zone') is a secure network connected to the FortiGate that only grants access if it ha
-
03:21 Popular
FortiGate Cookbook - FortiCloud (5.0)
Added 260 Views / 0 LikesIn this video, you'll be learning how to use FortiCloud to view log data and reports. With FortiCloud you can easily store and access FortiGate logs and reports that can give you valuable insight into the health and security of your network. Visit Fortine
-
03:20 Popular
FortiGate Cookbook Blocking Oversize File Downloads 01 21
Added 260 Views / 0 Likeshttps://plus.google.com/+charlyprudent/ nosql-database.org www.couchbase.com http://www.network-engineer.usa.cc http://www.crunchbase.com/person/charly-prudent https://github.com/charlyprudent
-
05:34 Popular
FortiGate Cookbook - MAC Access Control (5.2)
Added 259 Views / 0 LikesIn this video, you will learn how to add device definitions to your FortiGate using Media Access Control addresses, or MAC addresses. These definitions form a whitelist that allow you to control the devices that can access your wireless network. MAC addre
-
04:13 Popular
FortiGate Cookbook - Blocking Windows XP Traffic (5.2)
Added 259 Views / 0 LikesIn this video, you will learn how to use Application Control to block web traffic from devices running Windows operating systems in the NT5 category, including Windows XP and Windows Server 2003, and virtual machines of these OSs. When an operating system
-
01:41 Popular
Fortinet Unified Threat Management (UTM) Solution
Added 259 Views / 0 LikesFortinet's Unified Threat Management (UTM) security platform FortiGate provides you with the ability to protect your network with the fastest firewall technology on the market. You also have the freedom to deploy the wide range of security technologies av
-
04:56 Popular
FortiGate Cookbook - Blocking Tor Browsing (5.2)
Added 258 Views / 0 LikesIn this video, you will grant a Tor Browser user access to the internet, while monitoring the user's activity. Use of the Tor Browser will be blocked for all other users. Tor, or The Onion Router, allows users to bounce their traffic around a distributed
-
05:01 Popular
FortiGate Cookbook - Remote Access With SSL VPN (5.0)
Added 258 Views / 0 LikesIn this video, you're going to learn how to configure SSL-VPN to allow a remote user to safely connect to a FortiGate-protected network, while enforcing the FortiGate's security policies for this user. An SSL-VPN tunnel allows users to remotely access a n
-
05:03 Popular
FortiGate Cookbook - Redundant Internet Connections (5.2)
Added 257 Views / 0 LikesIn this video you will learn how to create a virtual Wide Area Network link that provides your FortiGate unit with redundant Internet connections from two Internet Service Providers or ISPs. The virtual WAN link combines both connections into a single int
-
03:05 Popular
FortiGate Cookbook - DLP And File Filtering (5.0)
Added 257 Views / 0 LikesIn this video, you will learn how to prevent documents and files passing through your FortiGate firewall, using Data Leak Prevention and File Filtering. Visit Fortinet's documentation library at http://docs.fortinet.com or our video portal at http://video
-
02:41 Popular
FortiGate Cookbook - Traffic Logging (5.2)
Added 256 Views / 0 LikesIn this example, you will enable logging to capture the details of the network traffic processed by your FortiGate unit. Capturing log details will provide you with detailed traffic information that you can use to asses any network issues. Visit Fortinet'
-
05:02 Popular
FortiGate Cookbook - Limiting Bandwidth With Traffic Shaping (5.2)
Added 252 Views / 0 LikesIn this video, you will learn how to configure Traffic Shaping on your FortiGate to limit the bandwidth for a specific IP address. When a particular IP address on your network is using too many resources, you can prevent that IP from consuming your bandwi
-
02:38 Popular
FortiGate Cookbook - BYOD Scheduling (5.0)
Added 250 Views / 0 LikesIn this video, you're going to learn how to configure a scheduling policy to limit BYOD users and their devices' access to the internet. Portable wireless devices are common in the workplace, and can be excellent resources for networking and productivity,
-
07:59 Popular
FortiGate Cookbook – Self Signed Certificates For SSL Inspection 5 2
Added 250 Views / 0 Likes