Skip to content Skip to navigation Skip to footer

CyberGlossary

CyberGlossary로 네트워크 보안에 대해 자세히 알아보기

개요

포티넷은 공격면을 지능적인 방식으로 원활히 보호하며 현재는 물론, 미래에 대한 점차 커지는 성능 요구사항을 충족하고 있습니다.

포티넷 제품은 네트워크 보안, 보안 인프라, IoT, OT, 엔드포인트 보안, 클라우드 보안을 위한 가장 다양한 보안 기능을 갖추고 있습니다.

CyberGlossary – 사이버 보안 교육을 위한 리소스. 지속해서 확장되는 포티넷 라이브러리를 사용하여 사이버 보안의 핵심 주제와 관련된 새로운 개념을 학습하세요.

클라우드 보안

기업 운영에서 상당 부분은 클라우드 스토리지, 통신, 인프라에 의존하기 마련입니다. 그러므로 클라우드의 시스템과 자산을 보호하는 것이 최우선 과제가 되어야 합니다. 클라우드 보안은 잠입한 공격자가 인프라를 변경하거나 해킹하지 못하게 차단합니다. 또한, 클라우드에 저장된 독점적 정보나 고객 정보를 비롯한 모든 데이터를 보호합니다. 완전한 클라우드 보안 솔루션은 클라우드 기반 트래픽에 액세스하는 대상을 제어합니다. 기업 내부 사용자는 물론이고, 외부 사용자의 액세스를 제한할 수 있습니다. 기업은 저마다 다르기 때문에 다양한 요구 사항에 따른 클라우드 보안 옵션이 존재합니다. 포티넷은 맞춤 설정을 통해 고객사의 상황에 맞는 100% 고유한 솔루션으로 구현할 수 있습니다.

클라우드 보안

Related Resources

다이나믹 클라우드 보안

다양한 워크로드를 여러 클라우드에 배포하는 기업이 점점 늘어나고 있습니다.

Fortinet SASE - PacketPushers Podcast

시큐어 액세스 서비스 엣지(SASE)는 네트워크 및 보안 기능과 WAN 기능을 결합한 새로운 엔터프라이즈 전략으로써 포티넷의 SASE와 함께 보안을 만들어 가세요.

CyberSecurity

Anything connected to the internet needs cybersecurity. This includes the computers and mobile devices you use to do everyday work and involves applications that need to access the internet to function. In addition, cybersecurity can protect the infrastructure of your network by safeguarding servers, routers, access points, and switches from invasive programs and hackers. A complete cybersecurity solution often incorporates multiple layers of protection. These can be configured to support each other and unite to form a more solid barrier against internet threats.

CyberSecurity Issues

Related Resources

FortiGuard Labs provides their predictions to ahead of the challenges organizations need to stay abreast of ongoing cyber trends, and begin preparing

Protect your financial services organization against advanced threats and increase operational efficiency with Fortinet’s cybersecurity solutions.

Discover why cybersecurity for K-12 school districts and physical security is crucial to enable digital learning across distributed campuses, meet com

엔드포인트 보안

The endpoints of your network—computers and mobile devices—are often easy points of entry for attackers. Endpoint protection shields your devices, whether malware is directly installed by hackers or an unsuspecting user installs it unwillingly. An endpoint protection solution begins with discovering endpoint risks, then monitoring and assessing the level of danger. Once the system identifies a threat, it can automatically contain and eliminate it. This is done using automated processes specifically designed with your business’ system in mind. Endpoint protection may also involve reducing your network’s exposure by eliminating or bypassing endpoints that elevate the level of risk.

Endpoint Protection Issues

Related Resources

FortiGuard Labs provides their predictions to ahead of the challenges organizations need to stay abreast of ongoing cyber trends, and begin preparing

Protect your financial services organization against advanced threats and increase operational efficiency with Fortinet’s cybersecurity solutions.

Discover why cybersecurity for K-12 school districts and physical security is crucial to enable digital learning across distributed campuses, meet com

네트워크 액세스

Network access control ensures visibility, control, and automated responses for all devices and systems comprising your network. Visibility involves forming profiles of each device connected to your network. The versatility of the network is enhanced when access is granted to outside products like switches, routers, and access points—without compromising the security and integrity of your IT infrastructure. Network access also defends your systems through responsiveness. As soon as a threat appears, it can be automatically eliminated. A network access system accomplishes this by changing configurations to keep your critical components and data safe.

Network Access Issues

Related Resources

What is NAC? | Fortinet

Gain Visibility, Control, and Automated Response across your wired and wireless network using NAC.

Zero-Trust Network Access: Security in an Evolving Threat Landscape

Network administrators must adopt a zero-trust approach to network access.

네트워크 보안

Network security is at the heart of a functional, productive business—regardless of its size or the scope of its services. The network security umbrella is broad and applies to a variety of devices, processes, and technologies. On a basic level, network security is composed of configurations and rules that are implemented into devices and systems on your network. These rules ensure your network’s integrity, privacy, and usefulness, and cover both the hardware and software that make your network run. Security measures can be applied to individual devices or to groups of components with the same level of vulnerability. You can also choose where to place protective measures.

Network Security Issues

Related Resources

Fortinet is recognized as a Leader in both the reports for FortiGate for enabling security and networking convergence.

What Is Network Security? | Fortinet

Learn about Industry’s broadest coverage of network security use-cases which reduces the complexity of enterprises with better visibility and performa

Received highest scores in both “Security-Sensitive WAN” (4.25/5) and “Small Footprint Retail” (4.14/5) Use Cases.

AI 기반 보안 관제

Security operations are those practices and teams that are devoted to preventing, detecting, assessing, monitoring, and responding to cybersecurity threats and incidents. Institutions may set up this monitoring and defending capability in a facility dedicated to security operations called a security operations center, or SOC.  Explore our collection of articles regarding security operations.

Security Operations Issues

Related Resources

FortiSandbox, Fast and Effective Protection against advanced threats

Sandbox works to detect advanced threats and deliver an effective automated advanced threat protection.

Advance Threat Protection

Even though hackers and data thieves have gotten more sophisticated, so has threat protection. An advanced threat-protection system provides security solutions that protect all devices on your network from malware and attempts to access sensitive data. This is accomplished by honing in on different attack surfaces and applying protective measures. This means protecting elements of your network such as endpoint devices, servers, and routers. Further, on a software level, email gateways and the central management console of your network can be shielded from a variety of threats. Each company’s setup is different in complexity and size, and your threat-protection solution can be customized to suit your needs.

Threat Protection Issues

Related Resources

FortiSandbox, Fast and Effective Protection against advanced threats

Sandbox works to detect advanced threats and deliver an effective automated advanced threat protection.