Vote for Fortinet in the Cybersecurity Excellence Awards
See the original Discussion
See the original Discussion
Fortinet’s Network Security Expert (NSE) Certification Program is in the running for two Cybersecurity Excellence Awards. Voting is open until January 31, 2021. Voting is easy and fast. Click on the t...
Hi, I've been working with a FortiGSLB PoC for a customer, where we have GoDaddy as DNS registrar/DNS server. The customer, had several teams involved having different points of contact: GoDaddy DNS m...
In today’s complex multi-vendor network environments, security teams often struggle to gain the visibility and control they need across their networks in order to maintain a strong security posture. M...
We are continuously the data disclosed by FireEye on the “Sunburst”/UNC2452 operation and working with customers ensure their protection, detect and mitigate this issue. All published and subsequent d...
FortiPenTest, Fortinet pentest-as-a-service cloud-based service has been recently updated to version 20.4. This new version brings improvements to all parts of the portal and also new features, that w...
A more updated version of this blog is now available: https://www.fortinet.com/blog/threat-research/what-we-have-learned-so-far-about-the-sunburst-solarwinds-hack By now you may have read from various...
Endpoints are a critical and growing part of a corporate infrastructure. Especially now in changing times with a growing teleworker force, endpoints need to be protected vigilantly. Cybersecurity atta...
In this blog post, I would like to bring to the attention one of the key features in FortiManager 6.4 release which has considerably improved the workflow for IPS Administrator for organizations that ...
SD-WAN has taken the WAN Edge market by storm over the past few years. Businesses and organizations are rapidly choosing SD-WAN in favor of traditional routers due to the added resiliency, traffic eng...
Many organizations have recently seen a shift to more remote and home working in response to world events. An expansion of the off-net workforce brings additional organizational security challenges. H...
If you haven't used the open source iperf tool before, there is a lot of info on it (see https://iperf.fr), and I will only say it allows us to generate UDP/TCP traffic between 2 hosts of any bandwidt...
Today Fortinet is proud to announce our enhanced support for securing SAP S/4HANA – SAP’s flagship ERP application. Fortinet offers unprecedented security and visibility for organizations seeking to s...
SAP is among the world's largest software companies, with some 92% of the Forbes Global 2000 using at least some of their enterprise application solutions. Most of these companies will deploy SAP S/4H...
Securing Email before the advent of Data-Centric Security Teleworking, public and home networks, personal devices, and cloud email services have combined to open up email to become the dominant source...
Companies are leveraging the power of Kubernetes to accelerate the delivery of resilient and scalable applications to meet the pace of business. These applications are highly dynamic, making it operat...
When discussing our Fortinet Security Fabric, we often focus heavily on the integration between the solutions across our own product suite. And why not? The Fortinet Security Fabric spans multiple sol...
Fortinet just released another free offer for organizations designed to further enhance the ability of their workforce to be cyber aware. This new Information Security Awareness and Training service w...
[Recap] It’s now been about 2 years since Wi-Fi 6 Access Points first showed up on the market, and about one year since we first looked at Wi-Fi 6 last year on our FortiCast podcast (link) where we ta...
Fortinet is proud to announce our latest addition to the FortiCloud group of products: FortiPenTest. FortiPenTest is a subscription based Penetration Test tool that can perform OWASP Top 10 vulnerably...
Protect your Datacenter infrastructure and deliver uptime with FortiDDoS Appliances By Vinod Sundarraj and Hemant Jain | Just when you thought DDoS attacks are being taken care by large cloud-based DD...
The Case in Point : How to block incoming connections sourced from IP addresses supplied as a list by a 3rd party commercial Threat Intelligence feed. Until FortiOS 6.0.1 we had to resort to custom sc...
The Fortinet Veterans Program (FortiVet) Community is LIVE! This is an open group for #veterans and #militaryspouses that are looking to transition into a career in #cybersecurity, military ready #emp...
One of our nonprofit partners, IVMF has issued a brief, “The Business Case for Hiring a Veteran: Beyond the Clichés,” which draws from academic literature to suggest a robust, specific and compelling ...
Are you a Fortinet Expert and interested in sharing your technology & industry expertise with your peers? If so, here comes an opportunity to showcase your knowledge, and show-off a Blogger badge on y...
There are more than 2.9 million unfilled cybersecurity jobs globally, according to a study by (ISC)2. And 59 percent of cybersecurity professionals surveyed for that study believe the widening talent ...
Use case: Customer has two ISP connections at both sites. Two VPNs configured. ISP1 to ISP1 and ISP2 to ISP2. Customer wanted to lower the time it takes for the VPN to drop and the other VPN come up. ...
First and foremost, a special shout out to a friend that helped with this config. Juan Perez, thank you brother. Use Case: Customer wants a single SSID in his environment. He wants Teachers on a VLAN ...
Networks are undergoing fundamental changes fuelled by the accelerated adoption of BYOD, the Internet of Things, and the cloud-first strategy. The new dynamic affects the efficiency of traditional net...
Fuse community just got an update! The latest site provides a refreshing look and feel, simplified UI, enhanced functionality for user engagement & group administration and opportunities for leadershi...