You are here

Whitepapers

All Years
FortiMail - Secure Email Gateway, Real World Results
Fortinet routinely submits our FortiMail Secure Email Gateway to Virus Bulletin's VB Spam testing to independently validate our effectiveness. We understand that real-world third party testing is a critical resource for Enterprise buyers, providing the independent assessment needed to choose among alternative security products in the market. Register now to read about their test methodology and how we earned yet another top VB Spam+ rating.
2014
FortiMail Playing safely in the Sandbox
This whitepaper explores how FortiMail can leverage the FortiSandbox Advanced Persistent Threat Detection appliance to protect your email infrastructure in real-time against targeted attack.
2014
DDoS Attack Mitigation Technologies Demystified
This whitepaper discusses some of the technologies used traditionally to detect and mitigate DDoS attacks, how they evolved and why the state-of-the-art technology must rely on Application Specific Integrated Circuits (ASICs), inline symmetric or asymmetric deployments, a wide-spectrum of analysis methods covering from Layer 2 (Data-Link layer) to Layer 7 (Application layer) of the OSI model, and why this must be done with high-performance, hardware-based architectures.
2014
Data Center Security – Virtual Appliances Ready for Prime Time?
In the following report from Infonetics Research, Principal Analyst Jeff Wilson discusses the drivers for security virtual appliance growth in the data center and why virtual appliance adoption growth will far outpace that of traditional data center hardware security appliances in the coming years.
2014
Securing Next Generation Mobile Networks
This whitepaper describes the key requirements, considerations and components of an LTE carrier security solution.
2014
Service Provider Security in a Changing Landscape
This whitepaper identifies the security challenges CSPs will face over the next 5 years. From fortifying mobile networks to cloud service offerings, service providers must rapidly adapt to remain not only vigilant, but also competitive. Learn more about this changing CSP landscape and how you can get a head start on minimizing impact to your infrastructure investment
2014
FortiWeb and the OWASP Top 10 2013
In this white paper from Fortinet you’ll learn about the Open Web Application Security project (OWASP) Top Ten security threats and how FortiWeb can protect you from each of them for complete application protection or to meet PCI DSS 6 compliance for your organization.
2014
Agile Network Security in the AWS Environment
This whitepaper discusses the rise of public cloud computing with Amazon Web Services (AWS), and how Amazon enables software-defined networking and network security for server instances in AWS EC2 and VPC.
2014
CSO Survey- APTs Top of Mind, Top of List
IDG Research CSO Survey: Priorities among top security initiatives in general, Next Generation Firewall (NGFW) projects in particular and even at the board-level.
2014
Unified Threat Management (UTM) for Dummies
Learn how UTM gives you the power to control your applications and devices, improve network security and performance, and consolidate the management of essential security technologies.
2014
What Does It Take to Score 100% on the NSS Data Center Firewall Test?
Read the new NSS Labs test report on the FortiGate 1500D to see what it takes to define the benchmark in its class for Data Center Firewall by scoring 100% in both Security Effectiveness and Firewall Performance.
2014
Transform Your WiFi Network Into A Secure Wireless LAN
This paper illustrates how Fortient delivers the integrated, consolidated security every organization needs to protect the Wireless LAN. FortiGate, FortiWiFi and FortiAP security platforms add layers of security to wireless traffic without affecting performance or increasing costs.
2014
Load Balancing Microsoft Exchange with FortiADC
Deployment Guides for FortiADC D and E series Application Delivery Controllers for Microsoft Exchange 2010 and 2013
2014
Custom Technology Adoption Report- NGFW
With 43% of organizations planning to deploy or expand next generation firewalls (NGFWs), Forrester Consulting conducted a survey to understand top drivers, requirements and decision criteria for NGFW projects. The results are analyzed in this technology adoption profile
2014
Security Incident Report: Data Breach at Target Corporation
In November and December of 2013, Cybercriminals successfully collected, staged and ultimately exfiltrated “Track 1 and 2” data related to millions of debate and credit cards. While many details remain unclear, a quite a few have emerged. This Fortinet report encapsulate what is believed to be publicly known about the incident- how Cybercriminals got in, how they got the data out and what the ramifications have been- as well as what security practices should be considered by organizations looking to reduce the likelihood of similar incidents.
2014
WAF or IPS
In this Fortinet Info Brief you’ll learn the differences between a Web Application Firewall (WAF) and a Firewall/IPS. Learn why you need the additional layers of security a FortiWeb WAF offers.
2014
IDC Technology Spotlight: Securing the Blended Data Center
IDC Analysts including John Grady, Christian Christiansen, and Charles Kolodgy discuss how security must change to address the new dynamics of Virtualization, Cloud and Software-defined Networking (SDN) technologies.
2014
Securing Distributed Healthcare Networks for PCI DSS 3.0 and HIPAA Compliance
Securing Distributed Healthcare Networks for PCI DSS 3.0 and HIPAA Compliance - How to Accelerate Compliance and Simplify Complex Networks
2014
Zero Trust Network Security
Forrester VP and Principal Security & Risk Analyst John Kindervag explores the concept of “Zero Trust” for building Security into Networks by default.
2014
Securing Distributed Enterprise Networks for PCI DSS 3.0 Compliance
This paper explores the challenges involved in achieving PCI DSS 3.0 compliance in the Distributed Enterprise and how Fortinet's innovative solution can help simplify and accelerate the compliance process.
2014
Head First Into the Sandbox
This paper provides a deeper look into Sandboxing technology, Sandbox evasion techniques and how the key components of Fortinet's FortiSandbox work together to thwart some of the most sophisticated network-based attacks.
2014
FortiDDoS - IDC Analyst Connection
2014
NSS Labs Breach Detection Systems (BDS) Test Report
NSS Labs recently conducted an independent, real-world test of Breach Detection systems. Their Security Value Map recommends specific products, including Fortinet’s FortiSandbox, while the Product Analysis Report shows exactly how FortiSandbox performed.
2014
The Basics of Server Load Balancing and the Evolution to Application Delivery Controllers
In this white paper from Fortinet you’ll learn the history of the Application Delivery Controller and why it’s different from basic server load balancers.
2014
Is Your Data Center Ready for Today’s DDoS Threats?
In this jointly developed white paper from Fortinet and Ixia you’ll learn the basics of a DDoS attack, methods to mitigate them, and how to thoroughly test your DDoS mitigation defenses.
2014
Fortinet’s Advanced Threat Protection Framework
This paper outlines the five key components of a coordinated approach to addressing the emerging class of advanced targeted attacks and advanced persistent threats. It explains how access control, threat prevention, threat detection, incident response and continuous monitoring must all work together for an effective and efficient defense.
2014
The Evolution of the Enterprise And Enterprise Security
This Whitepaper explores these and other trends, as well as how a FortiGate next generation firewall and related components can address these challenges.
2014
Data Center Trends and Network Security Impact
How virtualization, cloud computing and SDN are transforming the data center and impacting network security
2014
Fortinet’s FortiGuard Labs Reveals Newest Malware Trends in Latest Threat Report
reveals the leading platforms for mobile malware distribution, the top mobile and PC malware families, botnets and the countries responsible for the majority of the world’s spam.
2014
Protect Against Social Malware
This whitepaper examines the world of socially transmitted infections, a new kind of electronic STI that can cause almost as much pain as that other kind. Keep reading to find out how social media can be used to spread infections and learn tips to help keep you safe today.
2014
The World’s First Mobile Malware Celebrates its 10th Birthday
In this whitepaper, FortiGuard Labs looks at the most significant mobile malware over the last 10 years and explains their role in the evolution of threats.
2014
Security Gate & Gi Firewall - Protecting the Mobility Infrastructure
This white paper introduces the components and architecture of a secured LTE network implementation. It also explains why FortGate consolidated security platforms is best suited for carriers and service providers seeking a SeGW solution for their mobility networks.
2013
Threats on the Horizon: The Rise of the Advanced Persistent Threat
This Fortinet whitepaper (with executive summary) explores a number of highly targeted attacks and establishes common stages shared by many such attacks before delving into the range of measures- across product, people and process- an organization should consider to reduce its risk related to this emerging class of threat.
2013
SANS Analyst Whitepaper: Real-World Testing of Next-Generation Firewalls
This analyst whitepaper will help you determine which solution is best for your organization. It highlights: Recent trends in the threat landscape and recommended countermeasures, Essential capabilities to consider in a next generation firewall and How to define requirements for your organization, and test for them.
2013
FortiGuard Midyear Threat Report
This report highlights the most active threats our lab has analyzed in the last six months, new mobile malware data, an in-depth look at the recent S. Korean cyber attack and more.
2013
The Fortinet Secure Health Architecture
This white paper will highlight the Fortinet secure health architecture, as well as describe how to provide end-to-end security for modern healthcare organizations. It will highlight shifts in the industry and discuss Fortinet’s security approach and various options Fortinet has available between its strategies and products.
2013
Comprehensive Email Security for Enterprises and Service Providers
This white paper details the FortiMail Email Security platform and how it can be deployed to help protect your email servers against the evolving threat landscape.
2013
FortiMail Identity Based Encryption
This document details how email communications can be quickly and simply secured with zero impact to the internal users and no requirement for complicated client software or encryption keys to be shared with the recipient.
2013
UTM in Education
This paper will investigate many of the key challenges that universities and institutions of higher education face when attempting to secure their systems. It will discuss industry best practices designed to secure key systems such as databases and the network. Finally, this paper will discuss Fortinet’s unified approach to security, showing that UTM provides a cost-effective solution to increasing security for educational institutions.
2013
Securing Wireless Networks for PCI Compliance
This paper is intended for CIOs and CISOs in the retail industry. Maintaining compliance with PCI DSS is a top concern as there are significant effects on business operations, payment card transactions, organizational security and data protection.
2013
Anatomy of a Botnet Report
One of the greatest challenges in Internet security today is how to contain the global scourge that is the botnet. Botnet authors and their criminal organizations are continuously developing innovative ways to recruit new victims into their networks and monetize them.
2013
Real-World Network Security Testing
NSS Labs' 2013 group firewall test evaluated competing products' ability to provide high performance security and low latency. See how well the FG-800C performed in real-world tests.
2013
Fortinet recognized for delivering outstanding enterprise management, security effectiveness, and TCO
Fortinet’s FortiGate 800C Excels in NSS Labs 2013 Group Firewall Test to Earn Highest "Recommend" Rating with Very High Security Effectiveness and Very Low TCO
2013
Distributed Enterprise Solutions
See how Fortinet can provide the end-to-end, multi-layer security that retailers need to securely deliver a new breed of services for the customers and improve their own bottom line.
2013
Cutting Edge Security and Performance - 5001C is a Clear Choice
Fortinet allows MSSPs to deliver cutting edge security technologies to SMBs, while preserving their margin requirements and addressing broader markets. Through higher performance products like the 5001C blade and innovative approaches in providing security services such as using multi-tenant VDOMs, Fortinet gives providers the flexibility to grow their businesses into green field opportunities that are unreachable using any other equipment provider.
2013
Fortinet 2013 Cybercrime Report
This paper explores the world of the cybercriminal, describes how they build and deploy attacks to harvest valuable data, and what you can do to fight back.
2012
The Power To Secure The Cloud
How Fortinet protects your data as it flows to and from the cloud
2012
Pragmatic WAF Management: Giving Web Apps a Fighting Chance
Securosis’ “Pragmatic WAF Management: Giving Web Apps a Fighting Chance” discusses how to effectively use a web application firewall (WAF) for countering application threats and mitigate application vulnerabilities.
2012
FortiOS 5 List of New Features & Enhancements
FortiOS 5 contains over 150 new features and enhancements. These are grouped into 25 different categories; including Client Reputation, User-Based Identity, User Notification, IPv6 and Antivirus enhancements.
2012
The Importance of Client Reputation
This paper will examine the changing network threat landscape and the move from static to dynamic security. It introduces Fortinet’s newest client reputation functionality in FortiOS 5.0 Advanced Security Operating System. This functionality allows granular controls to evaluate what users are doing and if those actions might be part of a larger threat to the organization.
2012
NSS Labs 2012 Intrusion Prevention Systems Security Value Map
FortiGate-3240C delivers IPS protection, performance, and low TCO to earn NSS Labs’ “Recommended” rating.
2012
Protecting against DoS/DDoS Attacks with FortiWeb© Web Application Firewall
The white paper discusses today’s organization challenges having to deal with the rise in application layer DDoS attacks, the use of botnets in these attacks and the need for an integrated solution to protect against these attacks.
2012
FortiGate-3950B Demonstrates Highest Appliance Throughput and Resiliency in BreakingPoint™ Tests
Resiliency testing measures the performance of a given firewall under stressful and varying conditions. The BreakingPoint Resiliency Score™ is an automated test based on industry standards for performance, security, and stability of network and security devices. Fortinet recently conducted rigorous resiliency testing on the FortiGate®-3950B, using multiple BreakingPoint™ Elite chassis in different configurations in order to simulate real-world deployment. The FortiGate-3950B passed with an overall BreakingPoint score of 95/100 - the highest score on record.
2012
ICSA - Compliance, Incentives and Penalties: Hot Topics in US Health IT
Download the ICSA whitepaper to get a better understanding of some of the most noteworthy requirements for security in the USA’s Healthcare Provider IT market including PCI, HIPAA–BAA and ARRA–HITECH (HIPAA II)-covered entity.
2011
Next Generation Security for Enterprise Networks
Enterprises and service providers are deploying Next-Generation Firewalls in an effort to control web-based applications and block new blended network threats. Some Next-Generation Firewalls fail to include important next-generation features as well as adequate traditional network protections. This white paper defines the security features needed in a 'next-generation security' platform.
2011
Real Time Network Protection for Educational Institutions
Discuses the challenges of protecting today's educational networks and the need for a new, cost-effective and architecturally different approach for distributed and diverse educational network and computing environments.
2011
A Practical Guide for Beginning the Migration to IPv6
Describes the importance of securing the network against IPv6 threats well before the introduction of any IPv6 traffic, and outlines the steps involved to begin securing a transitional IPv4/IPv6 network.
2011
The Need for Secure Communications in a Distributed Environment
Discusses the challenges of protecting distributed environments and the need for network security systems that are designed to work together in a unified manner.
2011
Understanding How File Size Affects Malware Detection
Offers insight on how malware inspection performance is related to the size of malware-infected files and how different scanning methods can help to strike a balance between performance and security.
2011
Web Filtering: An Essential Part of a Consolidated Security System
Discuses the challenges of protecting enterprise networks with a layered defense employing multiple security technologies to protect against malicious content, sites, and other web-borne threats.
2011
Accelerating Unified Threat Management with Specialized Hardware
Provides a brief overview of the evolution of UTM platforms and explains why corporate IT departments are deploying specialized hardware to keep pace with new security threats and ever-faster enterprise networks.
2011
FortiGate DoS Protection - Block Malicious Traffic Before It Affects Critical Applications and Systems
Describes common DoS techniques, explains the technology integrated into every FortiGate consolidated security platform that helps in blocking DoS attacks, and offers suggestions on how to prevent an organization’s network from being used to attack another organization
2011
Controlling Web 2.0 Applications in the Enterprise
Describes the threats found in Web 2.0 applications, and how organizations need to deploy new methods of monitoring and controlling these Internet-based applications in order to discover and mitigate hidden security threats.
2011
Securing SCADA Infrastructure
Discusses how to protect Supervisory Control and Data Acquisition, or SCADA systems (specialized computer networks and devices that work in concert to monitor and control key processes involved in the management of machinery, equipment and facilities).
2010
Vulnerability Management for the Distributed Enterprise
Describes the challenges large distributed enterprises face in deploying vulnerability management technology in dozens, hundreds, or even thousands of remote locations, and Fortinet's solutions.
2010
Migrating to a FortiGate Firewall
Describes the best practices for performing firewall migrations, the benefits a migration process can achieve, and steps to take to ease the migration process itself.
2010
PCI Retail Audit Readiness
Highlights top reasons for assessment failure or security breach, and outlines a better way to secure your payment card infrastructure utilizing a UTM approach with an integrated Vulnerability Management (VM) strategy within an ISO/IEC 27001/2 Information Security Management System (ISMS) framework.
2010
FortiWeb Web Application Firewall: Ensuring Compliance for PCI DSS 6.5 and 6.6
Discusses the challenges organizations face in meeting PCI DSS 6.5 and 6.6 requirements, and how FortiWeb Web Application Firewall can address those challenges.
2010
Global Reputation Monitoring: The FortiGuard Security Intelligence Database
Describes how Fortinet’s FortiGuard Security Services delivers two essential services to Fortinet customers: Blocking spam emails before they reach customers’ mailboxes and blocking customers’ access to malicious web sites.
2010