Fortinet
Fortinet is a global leader and innovator in Network Security. Our mission is to deliver the most innovative, highest performing network security platform to secure and simplify your IT infrastructure. We are a provider of network security appliances and security subscription services for carriers, data centers, enterprises, distributed offices and MSSPs. Because of constant innovation of our custom ASICs, hardware systems, network software, management capabilities and security research, we have a large, rapidly growing and highly satisfied customer base, including the majority of the Fortune Global 100, and we continue to set the pace in the Network Security market. Our market position and solution effectiveness has been widely validated by industry analysts, independent testing labs, business organizations, and the media worldwide. Our broad product line of complementary solutions goes beyond Network Security to help secure the extended enterprise.
Fortinet is headquartered in Sunnyvale, California, with offices around the world. Founded in 2000 by Ken Xie, the visionary founder and former president and CEO of NetScreen, Fortinet is led by a strong and seasoned management team with deep experience in networking and security. For more information, visit our website at www.fortinet.com
-
01:38 Popular
Zero-Trust Network Access: Security In An Evolving Threat Landscape | Fortinet
Added 473 Views / 0 LikesLearn more: https://www.fortinet.com/blog/business-and-technology/know-who-and-what-with-zero-trust-network-access Explore Fortinet network access control solutions: https://www.fortinet.com/products/network-access-control Listen to Fortinet CISOs Jonatha
Featured -
01:10 Popular
Address The WAN And Access Edge With Fortinet SD-Branch | Network Security
Added 472 Views / 0 LikesLearn more: https://www.fortinet.com/use-cases/sd-branch.html Explore Fortinet SD-WAN solutions: https://www.fortinet.com/products/sd-wan/what-is-sd-wan.html Watch the SD-Branch lightboard video: https://www.youtube.com/watch?v=PRmOUZl4DG8 Read about the
Featured -
06:26 Popular
FortiGate Cookbook - Traffic Shaping (5.2)
Added 471 Views / 0 LikesIn this video, you will learn how to configure priority VoIP traffic shaping with your FortiGate. You will give VoIP communications a high traffic priority with a guaranteed bandwidth to ensure Quality of Service. To achieve high quality real-time voice t
Featured -
02:30 Popular
A Working Demonstration Of AndroRat With Audio
Added 471 Views / 0 LikesMore details can be found at the related blog post : http://blog.fortinet.com/Mobile-RAT-Infestation/ Video by : Ruchna Nigam Voice : Patrick Grillo
Featured -
00:31 Popular
Fortinet's Secure SD-WAN Solution | Network Security
Added 469 Views / 0 LikesExplore Fortinet SD-WAN solutions: https://www.fortinet.com/products/sd-wan.html Fortinet SD-WAN demo: https://www.youtube.com/watch?v=XFqUCBZSr7E Optimizing network performance with Secure SD-WAN: https://www.fortinet.com/blog/business-and-technology/for
Featured -
05:11 Popular
FortiGate Cookbook - Basic Application Control (5.2)
Added 468 Views / 0 LikesIn this video, you will use application control to track applications on your network and enhance security by restricting certain applications. The FortiGate database categorizes applications by Category, Technology, Popularity and Risk. In this example,
Featured -
05:29 Popular
How To Block Internet Access For Specific Machines
Added 468 Views / 0 LikesWas asked the best way to block internet access for specific machines. This video should give you some insight!
Featured -
04:17 Popular
Positioning And Selling Fortinet Solutions
Added 467 Views / 0 LikesShannon Curran, Regional Major Accounts Director for the Caribbean and Central America at Fortinet, explains the value proposition and benefits of having integrated solutions and security architectures that effectively simplify Cybersecurity processes for
Featured -
05:59 Popular
FortiGate Cookbook - YouTube For Education Filter (5.0)
Added 466 Views / 0 LikesIn this video, you will learn how to apply the YouTube for Education filter, and prevent users on your network from accessing video content that is not on YouTube's Educational Portal. Users often try to bypass web filters, so you will also learn to preve
Featured -
06:04 Popular
FortiGate Cookbook - Remote Browsing With VPN (5.2)
Added 466 Views / 0 LikesIn this video, you will learn how to use remote IPsec and SSL VPN tunnels to bypass internet access restrictions. A VPN tunnel is an encrypted traffic passage between two endpoints. In this example, the VPN tunnel is between a local user running FortiClie
Featured -
04:34 Popular
FortiGate Cookbook - FSSO Polling Using Windows AD (5.2)
Added 465 Views / 0 LikesIn this video, you will learn how configure Fortinet Single Sign On directly in the security policy using the new FSSO wizard, introduced in FortiOS 5.2.2. Visit Fortinet's documentation library at http://docs.fortinet.com or our video portal at http://vi
Featured -
05:59 Popular
FortiGate Cookbook YouTube For Education Filter 5 0
Added 464 Views / 0 LikesFeatured -
00:31 Popular
Foscam Persistent XSS Vulnerability
Added 464 Views / 0 LikesMore details at : http://blog.fortinet.com/post/stored-xss-vulnerabilites-on-foscam-3 FortiGuard Advisory : http://fortiguard.com/advisory/fortinet-discovers-foscam-stored-xss-vulnerabilities
Featured -
01:45 Popular
FortiAP With FortiGate | Integrated Wireless Management
Added 463 Views / 0 LikesLearn more: https://www.fortinet.com/products/secure-wifi/fortigate-integrated.html Explore FortiGate next-generation firewalls : https://www.fortinet.com/products/next-generation-firewall.html See how Fortinet solutions benefit business operations: https
Featured -
07:59 Popular
FortiGate (PPTP VPN) (v5.0.2)
Added 462 Views / 0 LikesFortiGate ile nasıl PPTP VPN yapılır ? RZK Mühendislik ve Bilgisayar Sistemleri
Featured -
04:09 Popular
Android Malware Gets Phish-y
Added 462 Views / 0 LikesA working demo of the Android malware Android/Chuli.A. Notes : - The first request receives an HTTP 200 as opposed to 404's for the following requests since the first page has been simulated on the localhost for the purpose of the demo. - The wireshark tr
Featured -
00:27 Popular
Hidex Demo 2: Invoking A Hidden Method In DEX Executables
Added 461 Views / 0 LikesThe demo shows a PoC application where a hidden method named "thisishidden()" is successfully called by the application. This was presented at conferences Hacktivity and Hack.Lu in Octoboer 2013 More details at : http://www.fortiguard.com/paper/Playing-Hi
Featured -
22:52 Popular
FortiGate Azure Technical Setup | Fortinet Product Demo
Added 461 Views / 0 LikesLearn more: https://www.fortinet.com/products/public-cloud-security/azure.html More and more enterprises are turning to Microsoft Azure to extend internal data centers and take advantage of the elasticity of the public cloud. While Azure secures the infra
Featured




