Configure FortiGate and FortiClient (v5.0.2) IPSec VPN for Secure Remote Access to Work Network
All Videos »
In order to tailor our subsequent communications to you and continuously improve our products and services (including registration), we may also ask you to provide us with information regarding your personal or professional interests, experience with our products, and more detailed contact preferences. Customers and visitors always have the option of choosing not to provide us with this information.
We may also employ certain applications, such as the various components of Security Center, to retrieve information about your computer system to assist us in the provision of services that you have chosen to subscribe to or use. This information is essential to enable us to provide you with quality service, and for that reason there is no opt-out available for this information collection.
If you provide us with your email address when you register as a customer or make a purchase from us, we may occasionally send you email with recommendations or notices of new products, prices, and services. This email may include paid advertisements from third parties. At the time you register or make a purchase, you will be given the opportunity to opt into our out of this service. If you do not initially choose to opt out, you may still block future email of this type, simply by following the unsubscribe instructions that accompany all such communications.
Separately, we send service notifications via email to keep you informed about the status of your service orders or accounts and to provide updates and technical notices. These messages are essential to the maintenance of your subscription and the functionality of our services. Therefore there is no opt-out available for service notifications and these messages cannot be blocked.
We follow industry standard practices for email marketing and customer contact, and we urge our business partners to do so as well.
We may also disclose, sell or assign personal information in connection with a corporate transaction, such as a merger, acquisition, sale of assets or restructuring.
Fortinet maintains log files of the traffic that visits our site. We do not link any information gathered in these log files to personally identifying information. Log files are used to manage traffic loads and information technology requirements for providing reliable service. Information collected includes IP addresses and browser types.
We didn't realize until after our Fortinet deployment how vulnerable we previously were to malicious Internet attacks. Fortinet has allowed us to view what is attempting to traverse our network and see firsthand what the FortiGate appliances are blocking.