白皮书

白皮书

   
Comprehensive Email Security for Enterprises and Service Providers
This white paper details the FortiMail Email Security platform and how it can be deployed to help protect your email servers against the evolving threat landscape.
2013
FortiMail Identity Based Encryption
This document details how email communications can be quickly and simply secured with zero impact to the internal users and no requirement for complicated client software or encryption keys to be shared with the recipient.
2013
UTM in Education
This paper will investigate many of the key challenges that universities and institutions of higher education face when attempting to secure their systems. It will discuss industry best practices designed to secure key systems such as databases and the network. Finally, this paper will discuss Fortinet’s unified approach to security, showing that UTM provides a cost-effective solution to increasing security for educational institutions.
2013
Secure Wireless LAN Solutions
This paper is intended for CIOs and CISOs in the retail industry. Maintaining compliance with PCI DSS is a top concern as there are significant effects on business operations, payment card transactions, organizational security and data protection.
2013
Anatomy of a Botnet Report
One of the greatest challenges in Internet security today is how to contain the global scourge that is the botnet. Botnet authors and their criminal organizations are continuously developing innovative ways to recruit new victims into their networks and monetize them.
2013
Real-World Network Security Performance Testing
NSS Labs' 2013 group firewall test evaluated competing products' ability to provide high performance security and low latency. See how well the FG-800C performed in real-world tests.
2013
Fortinet recognized for delivering outstanding enterprise management, security effectiveness, and TCO
Fortinet’s FortiGate 800C Excels in NSS Labs 2013 Group Firewall Test to Earn Highest "Recommend" Rating with Very High Security Effectiveness and Very Low TCO
2013
Distributed Enterprise Solutions
See how Fortinet can provide the end-to-end, multi-layer security that retailers need to securely deliver a new breed of services for the customers and improve their own bottom line.
2013
Cutting Edge Security and Performance - 5001C is a Clear Choice
Fortinet allows MSSPs to deliver cutting edge security technologies to SMBs, while preserving their margin requirements and addressing broader markets. Through higher performance products like the 5001C blade and innovative approaches in providing security services such as using multi-tenant VDOMs, Fortinet gives providers the flexibility to grow their businesses into green field opportunities that are unreachable using any other equipment provider.
2013
Fortinet 2013 Cybercrime Report
This paper explores the world of the cybercriminal, describes how they build and deploy attacks to harvest valuable data, and what you can do to fight back.
2012
The Power To Secure The Cloud
How Fortinet protects your data as it flows to and from the cloud
2012
Pragmatic WAF Management: Giving Web Apps a Fighting Chance
Securosis’ “Pragmatic WAF Management: Giving Web Apps a Fighting Chance” discusses how to effectively use a web application firewall (WAF) for countering application threats and mitigate application vulnerabilities.
2012
FortiOS 5 List of New Features & Enhancements
FortiOS 5 contains over 150 new features and enhancements. These are grouped into 25 different categories; including Client Reputation, User-Based Identity, User Notification, IPv6 and Antivirus enhancements.
2012
The Importance of Client Reputation
This paper will examine the changing network threat landscape and the move from static to dynamic security. It introduces Fortinet’s newest client reputation functionality in FortiOS 5.0 Advanced Security Operating System. This functionality allows granular controls to evaluate what users are doing and if those actions might be part of a larger threat to the organization.
2012
ROI of FortiGate
Fortinet technology provides you with business and security returns at a substantially lower cost. IANS Security Research conducted an Information Security Investment Analysis (ISIA) of Fortinet's unified threat management (UTM) solutions, interviewing Guess, Inc., an active Fortinet customer.
2012
Say 'Yes' to BYOD
Fortinet technology lets you say 'Yes' to Bring Your Own Device (BYOD). This white paper describes how you can take advantage of the productivity improvements provided by smartphones and tablets while keeping your organization secure. It provides an overview of the security issues raised by BYOD and outlines the security technologies you need to protect your information and help meet regulatory and compliance requirements.
2012
NSS Labs 2012 Intrusion Prevention Systems Security Value Map
FortiGate-3240C delivers IPS protection, performance, and low TCO to earn NSS Labs’ “Recommended” rating.
2012
Protecting against DoS/DDoS Attacks with FortiWeb© Web Application Firewall
The white paper discusses today’s organization challenges having to deal with the rise in application layer DDoS attacks, the use of botnets in these attacks and the need for an integrated solution to protect against these attacks.
2012
FortiGate-3950B Demonstrates Highest Appliance Throughput and Resiliency in BreakingPoint™ Tests
Resiliency testing measures the performance of a given firewall under stressful and varying conditions. The BreakingPoint Resiliency Score™ is an automated test based on industry standards for performance, security, and stability of network and security devices. Fortinet recently conducted rigorous resiliency testing on the FortiGate®-3950B, using multiple BreakingPoint™ Elite chassis in different configurations in order to simulate real-world deployment. The FortiGate-3950B passed with an overall BreakingPoint score of 95/100 - the highest score on record.
2012
Unified Threat Management (UTM) for Dummies
Learn how UTM gives you the power to control your applications and devices, improve network security and performance, and consolidate the management of essential security technologies.
2012
ICSA - Compliance, Incentives and Penalties: Hot Topics in US Health IT
Download the ICSA whitepaper to get a better understanding of some of the most noteworthy requirements for security in the USA’s Healthcare Provider IT market including PCI, HIPAA–BAA and ARRA–HITECH (HIPAA II)-covered entity.
2011
Next Generation Security for Enterprise Networks
Enterprises and service providers are deploying Next-Generation Firewalls in an effort to control web-based applications and block new blended network threats. Some Next-Generation Firewalls fail to include important next-generation features as well as adequate traditional network protections. This white paper defines the security features needed in a 'next-generation security' platform.
2011
Towards a Consolidated Approach for PCI-DSS Compliance
Over the past five years, the PCI-DSS framework has evolved from being mere guidelines without enforceable sanctions to a ‘must-have’ certification that you are required to obtain if you are involved in manipulating, storing or transmitting cardholder data. This white paper discusses how a consolidated approach to security can assist in PCI compliance.
2011
Real Time Network Protection for Educational Institutions
Discuses the challenges of protecting today's educational networks and the need for a new, cost-effective and architecturally different approach for distributed and diverse educational network and computing environments.
2011
A Practical Guide for Beginning the Migration to IPv6
Describes the importance of securing the network against IPv6 threats well before the introduction of any IPv6 traffic, and outlines the steps involved to begin securing a transitional IPv4/IPv6 network.
2011
The Need for Secure Communications in a Distributed Environment
Discusses the challenges of protecting distributed environments and the need for network security systems that are designed to work together in a unified manner.
2011
Understanding How File Size Affects Malware Detection
Offers insight on how malware inspection performance is related to the size of malware-infected files and how different scanning methods can help to strike a balance between performance and security.
2011
Web Filtering: An Essential Part of a Consolidated Security System
Discuses the challenges of protecting enterprise networks with a layered defense employing multiple security technologies to protect against malicious content, sites, and other web-borne threats.
2011
Accelerating Unified Threat Management with Specialized Hardware
Provides a brief overview of the evolution of UTM platforms and explains why corporate IT departments are deploying specialized hardware to keep pace with new security threats and ever-faster enterprise networks.
2011
FortiGate DoS Protection - Block Malicious Traffic Before It Affects Critical Applications and Systems
Describes common DoS techniques, explains the technology integrated into every FortiGate consolidated security platform that helps in blocking DoS attacks, and offers suggestions on how to prevent an organization’s network from being used to attack another organization
2011
Controlling Web 2.0 Applications in the Enterprise
Describes the threats found in Web 2.0 applications, and how organizations need to deploy new methods of monitoring and controlling these Internet-based applications in order to discover and mitigate hidden security threats.
2011
Securing SCADA Infrastructure
Discusses how to protect Supervisory Control and Data Acquisition, or SCADA systems (specialized computer networks and devices that work in concert to monitor and control key processes involved in the management of machinery, equipment and facilities).
2010
Vulnerability Management for the Distributed Enterprise
Describes the challenges large distributed enterprises face in deploying vulnerability management technology in dozens, hundreds, or even thousands of remote locations, and Fortinet's solutions.
2010
Migrating to a FortiGate Firewall
Describes the best practices for performing firewall migrations, the benefits a migration process can achieve, and steps to take to ease the migration process itself.
2010
PCI Retail Audit Readiness
Highlights top reasons for assessment failure or security breach, and outlines a better way to secure your payment card infrastructure utilizing a UTM approach with an integrated Vulnerability Management (VM) strategy within an ISO/IEC 27001/2 Information Security Management System (ISMS) framework.
2010
FortiWeb Web Application Firewall: Ensuring Compliance for PCI DSS 6.5 and 6.6
Discusses the challenges organizations face in meeting PCI DSS 6.5 and 6.6 requirements, and how FortiWeb Web Application Firewall can address those challenges.
2010
Global Reputation Monitoring: The FortiGuard Security Intelligence Database
Describes how Fortinet’s FortiGuard Security Services delivers two essential services to Fortinet customers: Blocking spam emails before they reach customers’ mailboxes and blocking customers’ access to malicious web sites.
2010
A Six-Step Plan for Competitive Device Evaluations
Organizations considering deploying sophisticated high-performance network and security devices require a more comprehensive approach to pre-deployment testing than traditional testing tools can provide, and this paper presents a six-step methodology for conducting competitive product evaluations.
2009
Ease Regulatory Compliance with FortiDB
Describes recent database breaches, and examine the common security mistakes made by database administrators, security personnel, and application developers.
2009
FortiWeb and the OWASP Top 10
Describes the OWASP Top 10 most critical web application security flaws, and how FortiWeb aids customers in mitigating the risks of the OWASP Top 10 threats.
2009
PCI in Retail: Understanding PCI DSS 2.0
Provides an overview of the Payment Card Industry’s Security Standards Council (PCI SSC) new PCI DSS 2.0 standard, and how Fortinet can help you comply with the new standard for protecting cardholder data.
2009
ICSA Labs PCI Report
Helps both merchants and QSAs by identifying where a specific product or family of products has the capability to satisfy or help to satisfy one or more of the individual PCI DSS requirements.
2009
NERC Compliance for Bulk Power Systems
Dicusses US and Canadian power industry regulations and outlines a way to secure infrastructure by leveraging a UTM approach and Vulnerability Assessment strategy that supports critical NERC compliance criteria.
2009
Network Security Consolidation
Discusses how network security consolidation using a Unified Threat Management (UTM) platform can help you deliver more effective security, notable cost savings, and a smaller environmental footprint.
2008
508 Compliance
Describes how Fortinet helps organizations demosntrate compliance of Section 508 Amendment to the Rehabilitation Act of 1973
2008

如何购买

免费电话 4006005255(中国)

FortiPlanner 规划工具

下载FortiPlanner工具评估和规划安全的Wi-Fi部署专为您的网络。

下载 FortiExplorer

下载 FortiExplorer 看到它是多么容易的设置和配置FortiGate和FortiWiFi产品平台的。