네트워크 액세스
네트워크 액세스 제어를 통해 네트워크를 구성하는 모든 장치 및 시스템에 대한 가시성, 제어 및 자동 대응이 보장됩니다. 가시성은 네트워크에 연결된 각 장치의 프로필을 형성하는 것이 포함됩니다. IT 인프라의 보안 및 무결성을 손상시키지 않고도 스위치, 라우터 및 액세스 포인트와 같은 외부 제품에 대한 액세스 권한이 부여되면 네트워크의 다양한 활용성이 향상됩니다. 또한 네트워크 액세스는 뛰어난 응답성을 통해 시스템을 방어합니다. 위협이 발견되면 즉시 자동으로 제거할 수 있습니다. 네트워크 액세스 시스템은 구성을 변경하여 중요한 구성 요소와 데이터를 안전하게 보호함으로써 이 작업을 완수합니다.
네트워크 액세스 이슈
제로 트러스트 에지
제로 트러스트 에지 아키텍처는 온프레미스와 클라우드 모두에서 네트워킹 및 보안 기술을 결합하여 ZTNA를 통해 모든 곳에서 제로 트러스트를 제공합니다. 제로 트러스트 에지 아키텍처에 대한 Fortinet의 접근법을 알고 계십니까?
What is an open proxy
An open proxy is a type of proxy server that can be used by anyone who wants to connect to the internet. Discover their pros and cons, and how to detect and avoid them.
Proxy server vs packet filtering firewall
Proxy servers and packet filtering firewalls protect networks. Discover the difference between a proxy server and a firewall and how to choose between them.
What is CIAM
Learn what Customer Identity and Access Management (CIAM) is, how it protects customer data, its benefits, and essential elements.
Cross site scripting
Cross-site scripting is a web security issue that enables cyber criminals to exploit a website or web application. Discover what an XSS attack is and how the Fortinet WAF can help organizations preven ...
PST file
A PST file is a file format that Microsoft software uses to store data and items like calendar events, email messages, and contacts. Discover the advantages and security issues with PST files and how ...
What is firmware
Firmware is a microcode that allows hardware devices to operate effectively. Discover how firmware security prevents firmware attacks and protects Internet-of-Things (IoT) devices.
Digital Certificates
A digital certificate is an electronic password that authenticates and verifies a device or user. Discover what are digital certificates and how Fortinet helps organizations secure their internet traf ...
Rootkit
Rootkit is a type of malware that enables attackers to take control of machines and steal data. Learn about the types of rootkits and how to detect them.
트레이스 라우트
Traceroute가 무엇인지, 무엇에 사용되는지, traceroute 사용법을 알아보세요. Fortinet이 네트워크에 어떻게 도움이 되는지 알아보세요. ✓ 여기에서 traceroute에 대해 자세히 읽어보세요!
How to Setup a Proxy Server
Proxy servers sit between a user's computer and the internet, protecting your network from threats. Learn how to set up a proxy server on different operating systems and what to consider when choosing ...
File transfer protocol ftp meaning
Learn why you need FTP, how to use it, and the security challenges of FTP. Discover how the Fortinet NGFW can provide an enhanced layer of security for sensitive data sent using FTP that would otherwi ...
Scada and scada systems
SCADA is a system used to monitor and analyze data, and control industrial processes. Securing SCADA systems is crucial and vital to the safe operations of industrial machines. Discover how SCADA work ...
API key
An application programming interface (API) key is a code used to identify an application or user and is used for authentication in computer applications. Discover what an API key is used for and how F ...
Bot
Learn what a bot is, the different types of bots, and how to detect bot traffic. Discover how FortiWeb uses biometrics and bot deception to protect your system from bot attacks.
802.1x authentication
Learn what 802.1x authentication is, its main parts, how it works, and what you can do with it. Discover how with Fortinet NAC, users and devices can be authenticated, profiled, denied access, and res ...
Does a VPN Decrease Internet Speed
A virtual private network (VPN) encrypts data transmitted and received during online activity. But it can affect internet speed. Discover how Fortinet can help.
Does a Firewall Affect Internet Speed
Learn about how a firewall affects internet speed and why it may have an impact. Discover how FortiGate NGFWs provide throughput while protecting your network.
How To Implement Zero Trust
Learn how to implement zero-trust security and the steps you need to take. Discover how FortiNAC provides you with zero-trust protection and full visibility.
Centralized Management
Learn what central management is, why it is needed, and its benefits. Discover how FortiManager keeps your network secure with centralized, automated processes.
Network monitoring
Learn what network monitoring is, why it is needed, the different methods, and what each monitoring tool does. Discover how FortiEDR prevents data exfiltration.
VPN routers
Learn what VPN routers are, why they are needed, the different types, and some of their disadvantages. Discover how FortiGate can provide you with a secure VPN.
Kerberos authentication
Kerberos has been around for decades and remains a credible security system. Learn about Kerberos authentication, how it works, and how the Fortinet FortiWeb can be configured for authentication deleg ...
What is DPI
DPI(심층 패킷 검사)가 무엇인지, DPI가 어떻게 맬웨어를 차단하고 데이터 유출을 막는지 알아보십시오. FortiGate NGFW가 DPI를 사용하여 위협을 식별하는 방법을 알아보십시오.
Dynamic DNS
Learn what dynamic DNS is, how it differs from DNS, how it works, and the benefits of DDNS. Discover how to configure the Fortinet dynamic DNS in a few easy steps.
Privileged Identity Management
Learn what privileged identity management (PIM) is, its uses, and the risks of unmanaged identities. Discover how Fortinet identity access management (IAM) services enhance security.
Oauth
OAuth allows unrelated websites and applications to share assets. Learn how OAuth enables users to grant access to their information without giving away their password.
Network access control list
Learn what a network access control list (ACL) is, its benefits, and the different types. Discover how FortiNAC provides you with access control and visibility.
Latency
Learn what latency is, how it works, and how it differs from bandwidth and throughput. Discover how FortiGate protects your organization from threats while reducing latency.
BGP Border Gateway Protocol
Learn what Border Gateway Protocol (BGP) is, how it works, and its characteristics. Discover how FortiDDoS' support of BGP Flowspec protects your network and devices from DDoS attacks.
DMARC
DMARC is an email security protocol that verifies email senders by supporting email protocols like DNS, DKIM, and SPF. Discover how DMARC works and how FortiMail can help detect and prevent inbound an ...
Internet fraud
Internet fraud involves using online services and software that have access to the internet to defraud or take advantage of victims. Discover common types of internet scams and how Fortinet can protec ...
LDAP Authentication
LDAP is a software protocol used for authentication and communication in directory services. Discover how LDAP authentication works and how Fortinet NGFWs provide deep content inspection with features ...
Remote Desktop Protocol
Remote desktop protocol (RDP) enables computer users to access another computer in a different location. Discover how RDP works and how Fortinet can help you secure RDP traffic with FortiGate next-gen ...
Federated identity
Federated identity links a user’s online identity across multiple domains and networks. Learn how to manage federated identity and how it differs from SSO.
API security
API security is the practice of preventing attacks on application programming interfaces (APIs). See the biggest API threats and how to protect against them.
Radius Protocol
RADIUS is a client/server security protocol that is used to authenticate and authorize remote user access. Learn how to manage identities for a remote network.
Login credentials
Login credentials, typically a username and password, authenticate a user logging into an online account. Learn how to create secure login credentials.
Firewall configuration
Proper firewall configuration ensures network access is blocked for unauthorized users. Take these steps to configure your firewall and protect your network.
Certificate Management
Certificate management is the process of overseeing digital certificates to prevent network disruption. See the steps needed to manage SSL/TLS certificates.
Authentication Token
An authentication token is a secure device that allows access to protected resources. Learn how token-based authentication verifies user identity.
SQL injection
In an SQL injection, attackers attempt to exploit vulnerabilities in an application's code by inserting an SQL query into regular input or form fields.
What is network access control
Network access control, also known as network admission control, is the process of restricting unauthorized users and devices from gaining access to a corporate network. Learn how FortiNAC helps with ...
OIDC
OpenID Connect (OIDC) is an authentication protocol that allows applications to verify the identity of users. Learn how OIDC supports OAuth with the use of ID tokens.
SSO
Single sign-on (SSO) enables users to log in to multiple applications and websites with one set of credentials. Learn how SSO works and how it can strengthen security.
What is Network Traffic
Network traffic is the data moving across a computer network at any given time. Learn how monitoring traffic can improve network performance and security.
OCSP
The Online Certificate Status Protocol (OCSP) is used to check the revocation status of digital certificates. Learn how OCSP is an improvement over CRL.
What is SAML vs. OATH
When considering an SSO protocol, SAML and OAuth both have advantages. Learn more about these open standards, including the security implications of each.
What is Privileged Access Management
Privileged access management (PAM) is a system that securely manages access to accounts with heightened permissions. Learn how IAM can strengthen PAM solutions.
OSI Model
The OSI model provides a framework to allow different computer systems to communicate with each other. Learn more about the 7 Network layers of the OSI reference model.
What is ARP
Learn how ARP works, the types of ARP, and why it is necessary. Discover how the Fortinet NAC solution provides enhanced visibility across the network to keep up with the ever-evolving threat landscap ...
User-datagram-protocol-udp
Learn how UDP works and used in DDoS attacks. Discover how FortiDDoS's responsive and dynamic security solution can help guard your network with extremely low latency.
What is URL Filtering
URL filtering is the process that restricts the websites and content that employees can access. Learn how URL filtering works, the benefits of using it, and how the Fortinet SWG solution can help in e ...
How does vpn work
A VPN is an encrypted network that enables users to browse the web securely. Learn about VPN encryption and protocols and how Fortinet can help protect your users, devices, and networks.
WAN 집계란 무엇입니까?
WAN 집계가 SD-WAN 처리량 향상에 도움이 될 수 있는지 알아보십시오. WAN Aggregation이 성능을 높이고 네트워킹을 간소화하는 방법을 알아보십시오.
Identity and Access Management
Identity and Access Management defines the digital identity of each user and device. Learn why IAM is a critical component of the Zero Trust model and your network security..
What is the Zero Trust Security Model
Zero trust architecture secures the network from the inside out. Learn how to shrink the attack surface and implement a zero trust model for your network.
Wireless Network
A wireless network, whether PAN, LAN, MAN, or WAN, helps users connect wirelessly with your network, the internet, and each other. Learn how FortiGate Integrated Wireless Management solutions keep you ...
What is DNS
Learn what DNS is, including the different types of DNS servers and DNS caching. Find out how the Fortinet DNS solution creates a safer network experience.
What is DMZ
A demilitarized zone (DMZ) is a perimeter network that protects an organization’s internal local area network (LAN) from untrusted traffic. A DMZ ensures a private network or LAN remains secure.
Network Automation
Learn what network automation is and how it works. What are the benefits of an automated network? See what is involved when it comes to Fortinet’s role as an authority on network device management.
Network Segmentation
Network segmentation splits up a network to achieve better traffic flow control. Learn how dividing your network can improve overall security and performance.
Zero Trust
Zero Trust architecture secures the network from the inside out. Learn how to shrink the attack surface and implement a Zero Trust model for your network.
Authentication vs authorization
Authentication and authorization are two key components of access control. Learn about the differences between the two and how the Fortinet IAM tool can enable secure access.
What is UEBA
User and entity behavior analytics (UEBA) uses machine learning to detect anomalies in the behavior of users and devices connected to a corporate network.
WAN
WAN(광역 네트워크)이란 기술은 서로 다른 위치에 있는 사용자를 서로 연결합니다. ✓ 이 가이드를 사용하여 WAN이 통신에 중요한 이유를 알아보십시오.
DDoS Attack
Distributed Denial-of-Service (DDoS) attacks can flood your servers and take down online services. Learn more about DDoS Meaning, attack types, and examples.
Ethernet Switching
Ethernet switches act like a hub for your LAN devices. Learn how switches can optimize your network and find out why integrated security features are essential.
BYOD
Bring your own device (BYOD) means when employees use personal devices to connect to the organization's network and access what they need. ✓ Know BYOD Pros, Cons, and Security issues.