Accès au réseau
Le contrôle d’accès au réseau garantit la visibilité, le contrôle et les réponses automatisées pour tous les appareils et systèmes composant votre réseau. La visibilité implique la formation de profils pour chaque appareil connecté à votre réseau. La polyvalence du réseau est améliorée lorsque l’accès est accordé à des produits extérieurs tels que les commutateurs, les routeurs et les points d’accès, sans compromettre la sécurité et l’intégrité de votre infrastructure informatique. L’accès réseau protège également vos systèmes grâce à la réactivité. Dès qu’une menace apparaît, elle peut être automatiquement éliminée. Un système d’accès au réseau y parvient en modifiant les configurations pour assurer la sécurité de vos composants et données critiques.
Problèmes d’accès au réseau
What is SAML vs. OATH
When considering an SSO protocol; SAML, OAuth, & OIDC have their advantages. To learn more about these open standards check out our page. ✓ Read more here!
Virtual Desktop Infrastructure
Learn what virtual desktop infrastructure (VDI) is, how it works, and its key benefits. Discover VDI use cases to start thinking about how they can help you.
Colocation Data Center
Learn what a colocation data center is, how it works, and what makes it different from a regular data center. Discover the benefits of colocation.
Network as a Service
Learn what Network as a Service (NaaS) is, why it is a priority for businesses, and its advantages. Discover NaaS use cases to see how NaaS can work for you.
Network Address Translation
Network address translation (NAT) is a technique used by organizations to enable multiple devices to share a single public IP address. Learn what NAT is and how it works.
What is network access control
Network access control (NAC) in networking, also known as network admission control, restricts unauthorized users and devices from gaining access to a corporate network. Learn how FortiNAC can help yo ...
How does vpn work
A VPN is an encrypted network that enables users to browse the web securely. Learn about VPN encryption and protocols and how Fortinet can help protect your users, devices, and networks.
CI CD Pipeline
A CI/CD pipeline is an automated workflow that is made up of steps that must be completed to deliver new software. Discover CI/CD pipeline best practices for security and implementation.
What is CIAM
Learn what CIAM is and how it protects customer data, its benefits, and essential elements.
Authentication Token
An authentication token is a secure device that allows access to protected resources. Learn how token-based authentication verifies user identity.
Federated identity
Federated identity links a user’s online identity across multiple domains and networks. Learn how to manage federated identity and how it differs from SSO.
Kerberos authentication
Kerberos has been around for decades and remains a credible security system. Learn about Kerberos authentication, how it works, and how to configure for authentication delegation.
OCSP
The Online Certificate Status Protocol (OCSP) is used to check the revocation status of digital certificates. Learn how OCSP is an improvement over CRL.
Certificate Management
Certificate management is the process of overseeing digital certificates to prevent network disruption. See the steps needed to manage SSL/TLS certificates.
Dynamic Host Configuration Protocol
Dynamic Host Configuration Protocol (DHCP) dynamically assigns IP addresses to each device connecting to your network. Learn how it works, what it does, and why it is important.
RADIUS Protocol
RADIUS is a client/server security protocol that is used to authenticate and authorize remote user access. Learn how to manage identities for a remote network.
Network monitoring
Learn what network monitoring is, why it is needed, the different methods, and what each monitoring tool does. Reach why each component of a modern-day network increases the attack surface.
Latency
Latency is defined as a delay when a user takes an action on a network and when they get a response. Learn how latency works, and how it differs from bandwidth and throughput.
What is Network Traffic
Network traffic is the data moving across a computer network at any given time. Learn how monitoring traffic can improve network performance and security.
Bot
Learn what a bot is, the different types of bots, and how to detect bot traffic. Many bots are designed to cause harm or benefit their users at the expense of people, computers, or networks.
PST file
A PST file is a file format that Microsoft software uses to store data and items like calendar events, email messages, and contacts. Discover the advantages and security issues with PST files.
API key
An application programming interface (API) key is a code used to identify an application or user and is used for authentication in computer applications. Discover what an API key is used for.
Network access control list
Learn what a network access control list (ACL) is, its benefits, and the different types. This enables administrators to ensure that, unless the proper credentials are presented by the device, it cann ...
OIDC
OpenID Connect (OIDC) is an authentication protocol that allows applications to verify the identity of users. Learn how OIDC supports OAuth with the use of ID tokens.
Oauth
OAuth authorizes users through SSO to grant access to their information without giving away their password. Learn how OAuth works and compares to SAML.
LDAP Authentication
LDAP is a software protocol used for authentication and communication in directory services. Discover how LDAP authentication works.
What is DPI
Learn what deep packet inspection (DPI) is and how DPI works to block malware and stop data leaks. Discover how the FortiGate NGFW uses DPI to identify threats.
What is firmware
Firmware is a microcode that allows hardware devices to operate effectively. Discover how firmware security prevents firmware attacks and protects Internet-of-Things (IoT) devices.
What is URL Filtering
URL filtering is the process that restricts the websites and content that employees can access. Learn how URL filtering works, the benefits of using it, and how the Fortinet SWG solution can help in e ...
Internet fraud
Internet fraud involves using online services and software that have access to the internet to defraud or take advantage of victims. Discover common types of internet scams and how to protect your bus ...
Remote Desktop Protocol
Remote Desktop Protocol (RDP) enables a computer user to access another computer in a different location. Discover how RDP works and how to secure RDP traffic.
Login credentials
Login credentials, typically a username and password, authenticate a user logging into an online account. Learn how to create secure login credentials.
Dynamic DNS
Dynamic DNS (DDNS) automatically detects and updates any changes in IP address. Learn what dynamic DNS is, how it differs from DNS, and the benefits of DDNS.
How To Pick a Work-from-Home Wi-Fi Router
Learn how to pick a Wi-Fi router for home and the most important features it needs to come with.
Transparent Proxy
A transparent proxy acts as a server position between a user’s device and the website they are trying to access. Discover how transparent proxy works and its use cases.
What is an open proxy
An open proxy is a type of proxy server that can be used by anyone who wants to connect to the internet. Discover their pros and cons, and how to detect and avoid them.
Cross site scripting
Cross-site scripting (XSS) is a web security issue that enables cybercriminals to exploit a website or web application. Discover types of XSS attacks and how to prevent them.
What is Privileged Access Management
Privileged access management (PAM) is a system that securely manages access to accounts with heightened permissions. Learn how PAM prevents cyberattacks.
Static vs dynamic ip
One of the main differences between static vs. dynamic IP addresses is that static IPs stay the same while dynamic IPs change. A static IP address is better for enterprises that own websites and inter ...
Privileged Identity Management
Learn what privileged identity management (PIM) is, its uses, and the risks of unmanaged identities.
SQL injection
An SQL injection (SQLi) attack exploits vulnerabilities in an application's code by inserting an SQL query into regular input or form fields. Learn more about SQLi attack prevention & mitigation.
OSI Model
The OSI model provides a framework to allow different computer systems to communicate with each other. Learn more about the 7 Network layers of the OSI reference model.
VPN routers
Learn what VPN routers are, why they are needed, the different types, and some of their disadvantages. Discover how FortiGate can provide you with a secure VPN.
802.1x authentication
Learn what 802.1X authentication is, its main parts, how it works, and what you can do with it. Discover how with Fortinet NAC, users and devices can be authenticated, profiled, denied access, and res ...
How to Setup a Proxy Server
Proxy servers sit between a user's computer and the internet, protecting your network from threats. Learn how to set up a proxy server on different operating systems and what to consider when choosing ...
Does a VPN Decrease Internet Speed
A virtual private network (VPN) encrypts data transmitted and received during online activity. But it can affect internet speed. Discover how Fortinet can help.
Proxy server vs packet filtering firewall
Proxy servers and packet filtering firewalls protect networks. Discover the difference between a proxy server and a firewall and how to choose between them.
Does a Firewall Affect Internet Speed
Learn about how a firewall affects internet speed and why it may have an impact. Discover how FortiGate NGFWs provide throughput while protecting your network.
What is Network Edge
The network edge is where a device or a local network communicates with the internet. Learn how to improve security on the edge of interconnected networks.
DMARC
DMARC is short for Domain-based Message Authentication, Reporting, and Conformance. DMARC is an email security protocol that verifies email senders by supporting email protocols like DNS, DKIM, and S ...
Firewall configuration
Proper firewall configuration ensures network access is blocked for unauthorized users. Take these steps to configure your firewall and protect your network.
SSO
Single sign-on (SSO) enables users to log in to multiple applications and websites with one set of credentials. Learn how SSO works and how it can strengthen security.
API security
API security is the practice of preventing attacks on application programming interfaces (APIs). See the biggest API threats and how to protect against them.
Universal ZTNA
Learn what universal ZTNA is, how it works, and its benefits. Discover how universal ZTNA can secure your infrastructure while supporting authorized access.
Zero Trust Edge
L’architecture Zero Trust Edge réunit les technologies de mise en réseau et de sécurité, à la fois sur site et dans le cloud, pour rendre Zero Trust disponible partout avec ZTNA. Comprendre quelle est ...
User datagram protocol
User Datagram Protocol (UDP) is a protocol used for communication throughout the internet. Learn how UDP works, the difference between UDP and TCP, and how it is used in DDoS attacks.
Scada and scada systems
SCADA is a system used to monitor and analyze data, and control industrial processes. Securing SCADA systems is crucial and vital to the safe operations of industrial machines. Discover how SCADA work ...
Centralized Management
Learn what central management is, why it is needed, and its benefits. Discover how FortiManager keeps your network secure with centralized, automated processes.
How To Implement Zero Trust
Learn how to implement zero trust security and the steps you need to take. Understand why implementation involves a policy of never trusting and always verifying the authenticity and privileges of dev ...
BGP Border Gateway Protocol
Learn what Border Gateway Protocol (BGP) is, how it works, and its characteristics. BGP takes into consideration all the different peering options a router has and chooses the one closest to where the ...
File transfer protocol ftp meaning
Learn why you need File Transfer Protocol (FTP), how to use it, and the security challenges of FTP. FTP refers to a group of rules that govern how computers transfer files from one system to another ...
Digital Certificates
A digital certificate is an electronic password that authenticates and verifies a device or user. Discover what are digital certificates and how Fortinet helps organizations secure their internet traf ...
Traceroutes
Découvrez la définition d'un traceroute et comment exécuter un traceroute. Voyez comment Fortinet peut vous aider.
Qu’entend-on par ARP ?
Apprenez comment fonctionne l’ARP, quels sont les types d’ARP et les raisons de sa nécessité. Découvrez comment la solution NAC de Fortinet offre une meilleure visibilité sur le réseau pour faire face ...
Qu’est-ce que l’agrégation de WAN ?
Découvrez la définition de l’agrégation WAN et comment cette option peut améliorer les performances. Apprenez-en plus sur l'agrégation WAN sur Fortinet.
What is the Zero Trust Security Model
Zero trust architecture secures the network from the inside out. Learn how to shrink the attack surface and implement a zero trust model for your network.
Wireless Network
A wireless network, whether PAN, LAN, MAN, or WAN, helps users connect wirelessly with your network, the internet, and each other.
What is DNS
Learn what a Domain Name System (DNS) is, including the different types of DNS servers and DNS caching.
Qu’entend-on par DMZ
Une DMZ permet aux organisations et aux particuliers d'ajouter une sécurité supplémentaire à leur réseau interne. Découvrez comment le pare-feu de nouvelle génération (NGFW) Fortinet FortiGate peut li ...
Network Automation
Network Automation uses applications to complete daily management tasks. Learn Network Automation Definition and how it can improve network efficiency and performance.
Network Segmentation
Network segmentation splits up a network to achieve better traffic flow control. Learn how dividing your network can improve overall security and performance.
Zero Trust
Zero Trust architecture secures the network from the inside out. Learn how to shrink the attack surface and implement a Zero Trust model for your network.
What is UEBA
User and entity behavior analytics (UEBA) uses machine learning to detect anomalies in the behavior of users and devices connected to a corporate network.
Authentication vs authorization
Authentication and authorization are two key components of access control. Learn the differences between authentication and authorization and discover how to secure access.
WAN
La technologie WAN, par définition, connecte les uns aux autres les utilisateurs situés à différents endroits. Découvrez la technologie WAN avec Fortinet.
DDoS Attack
Distributed Denial-of-Service (DDoS) attacks can flood your servers and take down online services. Learn more about DDoS Meaning, attack types, and examples.
Ethernet Switching
Ethernet switches act like a hub for your LAN devices. Learn how switches can optimize your network and find out why integrated security features are essential.
BYOD
Bring your own device (BYOD) means when employees use personal devices to connect to the organization's network and access what they need. ✓ Know BYOD Pros, Cons, and Security issues.
What Is an IP Address
Learn what is an IP address and as a unique number identifies any device that connects to the internet. Discover how IP addresses work and what IP addresses are available.
Remote Access
Learn what Remote Access is and how secure remote access can strengthen data security. Protect the devices in your organization for remote access connections with FortiGate.
Identity and Access Management
What is Identity Access Management System (IAM)? Learn why IAM is a critical component of your network security, what it is, examples, & more. ✓ Read here!