네트워크 보안
네트워크 보안은 서비스의 규모나 범위에 관계없이 기능적이고 생산적인 비즈니스의 핵심에 자리잡고 있습니다. 네트워크 보안은 넓은 범위에 걸쳐 보호 기능을 제공하며 다양한 장치, 프로세스 및 기술에 적용됩니다. 기본 수준에서 네트워크 보안은 네트워크의 장치 및 시스템에 구현되는 구성과 규칙으로 이루어져 있습니다. 이러한 규칙들은 네트워크의 무결성, 개인정보 보호 및 유용성을 보장하며 네트워크를 실행하는 하드웨어와 소프트웨어 모두에 적용됩니다. 보안 조치는 개별 장치 또는 동일한 수준의 취약성을 가진 구성 요소 그룹에 적용될 수 있습니다. 보호 조치를 마련해 두어야 할 위치를 선택할 수도 있습니다.
네트워크 보안 이슈
What Is Network Security?
Network security protects organizations' data, employees, and customers from various attacks. Discover the types of network security and how it can help secure your networks.
제로 트러스트 에지
제로 트러스트 에지 아키텍처는 온프레미스와 클라우드 모두에서 네트워킹 및 보안 기술을 결합하여 ZTNA를 통해 모든 곳에서 제로 트러스트를 제공합니다. 제로 트러스트 에지 아키텍처에 대한 Fortinet의 접근법을 알고 계십니까?
사이버 보안 메시란?
사이버 보안 메시가 무엇인지, 그리고 최신 사이버 위협을 해결하는 데 필요한 이유를 알아보십시오. 구현 방법과 이점에 대해 알아보십시오.
What Does a Firewall Do?
Learn what a firewall does, the types of firewalls, and their limitations. Discover how the FortiGate next-generation firewall with advanced SSL inspection can interpret traffic, and decrypt and scan ...
Proxy server vs packet filtering firewall
Proxy servers and packet filtering firewalls protect networks. Discover the difference between a proxy server and a firewall and how to choose between them.
Data Security
Data security protects digital information from corruption, damage, and theft. Discover how Fortinet protects your organization using various types of data security.
Firewall defined
Learn what a firewall is, why it is important, how it works, and firewall best practices. Learn how a firewall can ensure the data is harmless and prevent data from being stolen or compromised.
Message Authentication Code
Learn what Message Authentication Code (MAC) is, how it works, and the different types. Discover how FortiGate can protect you from illegitimate messages.
Data breach
What is a data breach? A data breach occurs when private information is accessed or exposed without authorization.
Thin Client
Learn what a thin client is, the differences between thin and thick clients, and how thin clients are used. Discover how FortiGate with its advanced features like web and packet filtering, IPsec, and ...
CIA triad
Learn what the CIA triad is, why you should use it, and when. Discover how the FortiSIEM solution enhances your information's confidentiality, integrity, and availability.
Krack attack
KRACK is short for Key Reinstallation Attack. Learn what KRACK attacks are and why they are so dreadful. During a hack, the attacker can access usernames, passwords, data, bank details, emails, and mo ...
What is caching?
A cache stores data in a local folder on a device. This can increase application or website performance and efficiency by speeding up load times the next time a user opens or visits an application or ...
Web security threats
Web security threats are cybersecurity risks that damage devices, systems, and networks. Discover common web security issues and how to keep your data and users secure.
What is 5g
Learn what 5G is, how it works, and the possibilities and vulnerabilities opened up by 5G technology. Discover how the FortiGate VPN uses machine learning to pinpoint zero-day threats and help keep yo ...
Firewall design principles
Firewalls prevent malicious data from going in and out of your networks. Learn five firewall design principles, the benefits of each, and the firewall techniques that enable them.
Hybrid firewall advantages disadvantages
A hybrid firewall is made up of multiple firewalls and can be tweaked to enhance your system's security performance. Learn its advantages and disadvantages and what to consider when looking at hybrid ...
sd-wan vs vpn
Both SD-WAN and VPN help organizations increase the security and performance of their networks. Discover the difference between the two, their pros and cons, and which best fits your organization.
Attack vector
Cybersecurity attacks are launched using attack vectors. Hackers use many methods to take advantage of system weaknesses. ✓ Learn how to avoid them!
상태 저장 방화벽 대 상태 비저장 방화벽 비교
스테이트풀(Stateful) 방화벽과 스테이트리스(Stateless) 방화벽의 차이점과 귀하의 비즈니스에 적합한 방화벽을 알아보십시오. 여기에서 더 많은 정보를 알아보세요.
How to Setup a Proxy Server
Proxy servers sit between a user's computer and the internet, protecting your network from threats. Learn how to set up a proxy server on different operating systems and what to consider when choosing ...
DNS leak
A Domain Name System (DNS) leak occurs when DNS requests are sent to an internet service provider (ISP) even when a virtual private network (VPN) is being used to encrypt browsing activity. Discover w ...
Fabric of security
Learn what a fabric of security is and the technologies that comprise it. Discover how the Fortinet Security Fabric prevents a variety of cyber threats.
SD-WAN Architecture
Software-defined wide-area network (SD-WAN) architecture can perform a host of functions, but most notably, it simplifies the control and management of IT infrastructure. Discover how you can secure y ...
Supply Chain Attacks
Learn what supply chain attacks are and how to counter them. Discover how the visibility and control offered by the Fortinet suite of solutions can guard your system.
What is Branch Networking
Learn what branch networking is, how to secure branch networks and the challenges of branch networking. Discover how Fortinet's NGFW secures branch networks.
SSL Certificate
Learn what an SSL certificate is, as well as the elements and types of SSL certificates. Discover how the Fortinet web application firewall (WAF) guards your web apps.
Proxy vs VPN
When it comes to data privacy, which is better—a proxy server or a VPN? Learn the differences between proxy vs. VPN and which is best for your business. Learn how Fortinet solutions can safeguard your ...
Network monitoring
Learn what network monitoring is, why it is needed, the different methods, and what each monitoring tool does. Discover how FortiEDR prevents data exfiltration.
Ping of death
The ping of death is a form of denial-of-service (DoS) attack that hackers use to crash or freeze computers, services, and systems. Discover how a ping of death command works and how Fortinet can prot ...
Edge computing
Learn what edge computing is, how it is used, its benefits, and some of its drawbacks. Discover how FortiNAC can secure IoT edge devices on your network.
Wardriving
Wardriving is a hacking method that involves scouring for unsecured wireless networks then gaining unauthorized access to steal data and commit illegal activity. Discover how wardriving attacks work a ...
Snort
SNORT is an open-source intrusion detection and prevention system that provides real-time network traffic analysis and data packet logging. Discover what is SNORT and how to import SNORT rules with Fo ...
What is https
Hypertext transfer protocol secure (HTTPS) is the secure version of HTTP. Learn how HTTPS encrypts data using Transport Layer Security (TLS) certificates.
Firewall as a service fwaas
Learn what Firewall as a Service (FWaaS) is, how it works, its advantages, and why companies need it. Discover how Fortinet's SASE service provides FWaaS with all the benefits of the FortiGate NGFW, i ...
Web scraping
Learn what web scraping is, how it is used, and how companies and individuals can abuse it. Discover how the Fortinet web application firewall (WAF) and FortiGuard can protect your company from scrape ...
Data governance
Learn what data governance is, why organizations govern their data, and how the data governance framework works. Discover how the Fortinet IAM solution can ensure proper data governance planning and e ...
Data integrity
Data integrity helps ensure the accuracy, completeness, consistency, and validity of corporate data. Discover data integrity risks and how Fortinet can help your organization secure data and data cent ...
VPN Blocker
Learn what VPN blockers are, why VPNs get blocked, and how to avoid them. Discover how Fortinet's advanced security solutions can help you bypass VPN blocks.
Enterprise security
Learn what enterprise security is, why it is important, best practices, and challenges. Discover how Fortinet FortiASIC can process content at an accelerated pace, enabling organizations to secure hug ...
Multi-factor authentication
Multi-factor authentication (MFA) confirms a user’s identity by requiring multiple credentials. Learn how MFA enhances network security and safeguards data.
Public key infrastructure
Learn what PKI is, how it encrypts communications, and the challenges PKI solves. Discover how Fortinet IAM verifies users trying to access your network.
Stateful firewall
A stateful firewall monitors the full state of network traffic streams. Learn how stateful inspection works and how it compares to a stateless firewall.
Radius Protocol
RADIUS is a client/server security protocol that is used to authenticate and authorize remote user access. Learn how to manage identities for a remote network.
Firewall configuration
Proper firewall configuration ensures network access is blocked for unauthorized users. Take these steps to configure your firewall and protect your network.
AAA security
Authentication, authorization, and accounting (AAA) is a security framework that controls network access. Learn how AAA protocols strengthen network security.
What is fedramp
FedRAMP assures cloud service providers (CSPs) meet security protocols set by the U.S. government. FedRAMP compliance helps CSPs, such as Fortinet, demonstrate trustworthiness and reliability in the m ...
What is Network Edge
The network edge is where a device or a local network communicates with the internet. Learn how to improve security on the edge of interconnected networks.
Data center security
Learn all about data center security, security technologies, and associated vulnerabilities. Discover how, with the FortiGate deep packet inspection (DPI) capability, you can keep your data center saf ...
해킹이란
해킹은 무단 액세스를 통해 디지털 장치 및 네트워크를 손상시키는 행위입니다. 해킹이 작동하는 방식, 다양한 유형의 해커와 해킹 사례로부터, Fortinet이 사이버 범죄로부터 사용자를 보호하는 방법을 알아보세요.
CSRF
Learn what is CSRF, how does it work, and how hackers construct a CSRF attack. Discover how the FortiGate intrusion prevention system (IPS) protects you from CSRF attacks through specific signatures d ...
Transparent Firewall
A transparent firewall is easily deployed, undetectable, and acts as a bridge between interfaces. Learn how to add security without re-architecting a network.
What is Perimeter Firewall
A perimeter firewall is a security device that defends the boundary between a private and public network. Learn how to monitor and control unwanted traffic.
VPN 분할 터널링
VPN 분할 터널링을 사용하면 VPN과 로컬 네트워크를 통해 트래픽을 동시에 라우팅할 수 있습니다. 대역폭을 절약하면서 데이터를 암호화하는 방법을 알아보세요. VPN 터널링과 구성알아보기.
How does a firewall work
Learn how a firewall works, the different kinds of firewalls, and how they protect data. Discover how FortiGate protects your network architecture and endpoints.
SAML
SAML allows identity providers to share credentials with service providers. Learn how it works, why it is important, and how the Fortinet IAM solution can protect your network.
SSL VPN
SSL VPN 동작 원리와 널리 사용되는 이유와 Fortinet VPN 기술이 장치 또는 네트워크 연결에 관계없이 위협으로부터 사용자를 보호하는 방법을 알아보십시오.
VPN의 장점
VPN의 장점은 단점보다 더 크고 비즈니스의 보안 프로필을 크게 강화할 수 있습니다. ✓ Fortinet이 어떻게 공격자를 차단하는지와 VPN 사용 이유를 알아보세요!
VPN Wifi
Learn what VPN Wi-Fi is and how Wi-Fi networks can threaten your devices. Discover how you can protect yourself from data breaches with Fortinet scalable crypto VPN while connected to Wi-Fi hotspots.
How does vpn work
A VPN is an encrypted network that enables users to browse the web securely. Learn about VPN encryption and protocols and how Fortinet can help protect your users, devices, and networks.
SDN vs SD-WAN
SDN (software-defined networking) has a lot in common with SD-WAN, but the two aren't interchangeable. ✓ Learn more & decide which technology you need!
소프트웨어보다 뛰어난 하드웨어 방화벽
하드웨어와 소프트웨어 방화벽의 차이점과 네트워크에 방화벽이 필요한 이유를 알아보십시오. 하드웨어 및 소프트웨어 방화벽은 어떻게 작동하며 두 기술은 어떻게 다릅니까? 하드웨어가 네트워크 보호를 위한 올바른 선택인 이유를 알아보십시오.
방화벽이란
네트워크 방화벽이란 무엇입니까? 방화벽 네트워크가 원치 않는 트래픽으로부터 네트워크를 보호하고 들어오는 맬웨어를 차단하는 방법을 알아보십시오.
IPS란 무엇입니까?
네트워크 보안에서 IPS가 무엇이며 이전 탐지 시스템의 단순한 인텔리전스를 넘어선 방법에 대해 알아보십시오. IPS의 침입 방지 시스템 작동 방식과 비즈니스에 IPS가 필수적인 이유를 알아보십시오.
DIY-vs-Managed SD WAN
Looking for an SD-WAN solution? Remember to consider your deployment method. Learn more and decide whether DIY or managed SD-WAN is right for your business.
QoS-서비스 품질
서비스 품질(QoS) 네트워킹의 개념과 Fortinet으로 트래픽 관리에 도움이 되는 QoS 설정 도구와 기술에 대해 알아보세요. ✓ 시작하려면 당사에 문의하십시오.
Wireless Security Tips
Wireless network security should be a business priority. These 10 tips on how to secure your Wi-Fi can help create a safer and more secure internet experience.
MPLS
Multiprotocol Label Switching (MPLS) is designed to get packets of data to their destinations quickly and efficiently. Learn more about what is MPLS in networking and how it works.
Data-Center
Data centers are the physical homes of the computer systems that power our daily lives. Learn more about the essential role these facilities play for business.
What is Port Scan
A port scan is a common technique hackers use to discover open doors or weak points in a network. ✓ Discover port scanning techniques and how to prevent attacks.
Intrusion Detection System
Learn about the different types of IDS, how they work, and how FortiGate IPS technology can protect organizations from known risks and zero-day threats.
Failover
Learn how the Fortinet FortiExtender can be used as a failover WAN link to keep the devices connected so operations can continue uninterrupted if there is an outage in the primary WAN.
What is Packet Loss
When accessing the internet or any network, small units of data called packets are sent and received. When one or more of these packets fails to reach its intended destination, this is called packet l ...
WAN
WAN(광역 네트워크)이란 기술은 서로 다른 위치에 있는 사용자를 서로 연결합니다. ✓ 이 가이드를 사용하여 WAN이 통신에 중요한 이유를 알아보십시오.
What is site to site vpn
Learn about the key components of site-to-site VPN and how to implement it. Find out how Fortinet high-performance VPN tools can protect your network.
What is Cryptography
Cryptography is the process of hiding or coding information so only the intended recipient can read a message. Discover how cryptography works and the potential risks it poses.
VPN
A VPN secures your identity as you send data over the Internet. ✓ See how to establish a virtual private network connection with this Fortinet guide.
VPN 안전성
VPN 보안은 인터넷을 안전하게 탐색하고 개인 정보를 보호하는 신뢰할 수 있는 방법이 될 수 있습니다. VPN이 어떻게 작동하고 VPN 안정성에 대해 알아보세요.
Benefits of firewall
Data protection is a core benefit of firewalls. Learn how NGFWs go further and provide versatile, updated advantages to keep your information secure.
Data Loss Prevention
What is Data loss prevention (DLP)? Learn how DLP Software can help in detecting and preventing data breaches and exfiltration of sensitive information.
SD-WAN Explained
Understand what is SD-WAN and how it enables digital transformation by simplifying operations, improving threat performance, & reducing costs. SD-WAN is simply a software-defined approach to managing ...