위협 보호
해커와 데이터 도둑의 기술이 더욱 정교해졌지만 위협 차단 기능 역시 더욱 강화되었습니다. 지능형 위협 차단 시스템은 네트워크의 모든 장치를 멀웨어와 민감한 데이터에 액세스하려는 시도로부터 보호하는 보안 솔루션을 제공합니다. 이는 서로 다른 공격 면에 방어 및 보호 조치를 적용함으로써 달성됩니다. 이는 엔드포인트 장치, 서버, 라우터와 같은 네트워크 요소를 보호하는 것을 의미합니다. 또한 소프트웨어 수준에서 이메일 게이트웨이와 네트워크의 중앙 관리 콘솔을 다양한 위협으로부터 보호할 수 있습니다. 각 회사의 설정은 그 복잡성과 규모가 서로 다르며, 위협 차단 솔루션을 그들의 요구에 맞게 맞춤화할 수 있습니다.
위협 보호 이슈
Whitehat security
Learn what white hat security is, the need for white hat security, and how a white hat hacker helps secure your network. Discover how white hat hackers use several sophisticated tools like parameters, ...
IoT Security Best Practices
Internet-of-Things (IoT) devices can be vulnerable to hacking and cyberattacks. Learn why this is so and the IoT security best practices you can implement to safeguard your devices, networks, and user ...
Code Scanning
Learn what code scanning is, how it finds vulnerabilities, and the different code scanning approaches. Discover how code scanning can benefit your organization.
URL Phishing
Learn what URL phishing is, how it works, and some common examples. Discover how to identify a phishing website and how to protect your organization from this type of threat.
What is Machine Learning?
Machine learning enables computers to learn without someone having to program them. Read an introduction to machine learning, types, and its role in cybersecurity.
RSA SecurID
Learn what RSA SecurID is and how it works. Explore its vulnerabilities and features to see how it can bolster your security posture.
Protecting Customer Information
Learn how companies protect consumer information to strengthen the organization. Discover how the Fortinet next-generation firewalls (NGFWs) and SD-WAN can help.
Threat Modeling
Threat modeling identifies and communicates information about the threats that may impact a particular system or network. Learn what threat modeling is and its techniques.
What is Splunk
Splunk is a big data platform that simplifies the task of collecting and managing massive volumes of machine-generated data and searching for information within it. Splunk helps correlate, capture, an ...
Black hat security
Black Hat Security is a criminal hacking activity carried out by black hat hackers. Discover who black hat hackers are, how they damage corporate systems, and how Fortinet can help your organization s ...
Captcha
CAPTCHA enables websites to validate visitors and prevent bots from accessing sites. Discover the different types of CAPTCHA code and how to configure CAPTCHA with Fortinet.
Data leak
A data leak happens when an internal party or source exposes sensitive data, usually unintentionally or by accident. Discover what causes data leaks and how to fix them.
Email Security
Email security includes the techniques and technologies that protect email accounts and communications. Learn how to guard against malware and phishing attacks.
What is Honeypot
Learn what is a honeypot and are designed to look like attractive targets, and get deployed to allow IT, teams, to monitor the system’s security responses and to redirect the attacker away from their ...
DNS Hijacking
Learn what DNS hijacking is, how to detect it, and the different types. Discover how to secure your network against DNS hijacking to protect your web assets.
Indicators of compromise
Learn what indicators of compromise (IOCs) are, how they work, and the most common types.
What is pci compliance
The Payment Card Industry Data Security Standard (PCI DSS) compliance helps secure credit card transactions. Discover how to become PCI DSS compliant and maintain the status.
Active defense
Active defense is the use of offensive tactics to slow down hackers and prevent cyberattacks.
Advanced threat protection atp
Learn what advanced threat protection is, the common ATP tactics, and how to defend against them. Discover how the Fortinet NGFW can filter all incoming and outgoing traffic and detect advanced threat ...
Insider Threats
An insider threat is a security risk originating from an employee or authorized user. Learn the different insider threat types and how to protect your organization against them.
IoT Device Vulnerabilities
Internet-of-Things (IoT) device vulnerabilities can lead to data theft and sophisticated cyberattacks. Discover the top IoT vulnerabilities and how to best protect your network and devices.
TCP-IP
What is Transmission Control Protocol? Learn the meaning of Transmission Control Protocol and how TCP models enable applications and devices. ✓ Click here!
DDoS Protection
DDoS protection is a security solution that detects and defends against denial-of-service threats. Create a DDoS protection plan to mitigate network attacks.
What is TTL
Learn what time to live (TTL) is & how it impacts your website. Discover how our tools can improve the experience of your online customers. Read more!
Heuristic Analysis
Heuristic analysis inspects commands or instructions in applications to detect malicious activity. Learn how it works and how it can help protect your system.
Devsecops
DevSecOps means integrating security at every phase of the software development lifecycle. Learn how development teams can deliver secure code more quickly.
Tailgating Attack
Learn what tailgating is, the different tactics used, and the difference between tailgating and piggybacking. Discover how to protect your company from this type of attack.
Spam filters
Learn what spam filters are and how they can help you. ✓ Discover how Fortinet can protect your critical data from being compromised in a breach.
Smurf Attack
A smurf attack is a form of DDoS attack that overwhelms networks and servers with Internet Control Message Protocol (ICMP) echo requests. Discover what a DDoS smurf attack is and how organizations can ...
Implement ddos mitigation strategy
A DDoS mitigation strategy is necessary to protect organizations from potentially devastating DDoS attacks. Learn the steps to DDoS mitigation and what to look for in a mitigation provider.
DNS Protection
Learn what DNS protection is, how it works, and how you can achieve it. Discover how enterprises can use DNS protection to safeguard DNS systems from attacks.
POS Security
Point-of-sale security (POS security) creates safe environments for customers to make purchases and complete transactions. Discover POS security measures your organization needs to implement and how F ...
Fault tolerance
Fault tolerance ensures systems continue to operate as usual despite failures or malfunctions. Discover how fault-tolerant systems work, the difference between fault tolerance vs. high availability, a ...
DoS 대 DDoS 비교
DoS 및 DDoS 공격은 서버를 사용할 수 없도록 하기 위해 트래픽으로 서버를 플러딩합니다. DoS와 DDoS 차이와 공격 유형이 어떻게 다른지, 어떻게 방어하는지 알아보세요.
인터넷 제어 메시지 프로토콜(Internet Control Message Protocol, ICMP)
ICMP는 네트워크 내의 장치가 데이터 전송 문제를 통신하는 데 사용하는 프로토콜입니다. ICMP의 동작 원리와 DDoS 공격에 사용되는 방식을 알아보세요. FortiDDoS가 DDoS 공격으로부터 시스템을 보호하는 방법을 알아보십시오.
Zero Day Attack
Zero day attacks are your network's unknown vulnerabilities. Discover how Zero Day Exploit Works and methods to defend against them.
Advanced Persistent Threat
Advanced persistent threats (APTs) hide in your network undetected, and as attacks evolve, businesses of all sizes are at risk. Learn how to combat APT.
2단계 인증
이중 인증은 사용자 로그인에 보안 계층을 추가합니다. 2FA가 작동하는 방식과 Fortinet 솔루션이 사용자가 액세스해야 하는 시스템과 리소스에만 액세스할 수 있도록 하는 방법을 알아보십시오.
What is Botnet
Learn what a botnet is and how these are misused for malicious purposes. A botnet can control your computer and use it to carry out cyber attacks.
What is Sandboxing
Sandboxing is a method in which you run, observe & analyze code in an isolated environment to protect your network. Learn why it's important & how to create a sandbox environment.
Spear Phishing
Spear Phishing attacks are highly targeted, hugely effective, and difficult to prevent. Explore how Spear Phishing works and best practices for its prevention.
What is Cyber Attack
A Cyber Attack is how cybercriminals gain access to networks and systems. Discover common Cyber Attack Methods and how the Fortinet cybersecurity solution can help you prevent them.
Data Exfiltration
Data exfiltration is the theft or unauthorized removal or movement of any data from a device. Discover the different data exfiltration types and how Fortinet solutions can prevent data exfiltration th ...
Malware
Malware, or malicious software, refers to cyberattacks such as viruses, spyware, and ransomware. Learn how to recognize and combat malware on your network.
DDoS Attack
Distributed Denial-of-Service (DDoS) attacks can flood your servers and take down online services. Learn more about DDoS Meaning, attack types, and examples.
Brute force attack
A brute force attack is a trial-and-error method to crack passwords and encryption keys. Discover how attackers launch a brute force attack and the impact on business-critical applications.
Man in the middle attack
A man-in-the-middle (MITM) attack occurs when criminals hijack web protocols to steal data. Discover how does a MITM attack works and how to protect endpoints.
SOAR
Learn more about the Security Orchestration, Automation, and Response (SOAR) platform. How does SOAR differ from SIEM and what are the benefits of implementing it?
통합 위협 관리
통합 위협 관리 시스템 솔루션 사용의 기능과 이점에 대해 알아보십시오. 맬웨어 방지 기능이 있는 Fortinet UTM이 네트워크 트래픽에서 의심스러운 파일을 검색하고 차단하여 민감한 데이터를 보호하는 방법을 알아보세요.
What is SIEM?
Learn how SIEM technology supports threat detection, compliance, and security incidents through collecting and analyzing security events and contextual data sources.
IoT
The Internet of Things (IoT) is defined as a network of physical objects that are connected to the internet using software, sensors, and other technologies. Learn what IoT means and its benefits.
IoT 보안
IoT 보안은 사물 인터넷 장치와 장치가 연결된 네트워크를 보호하는 행위입니다. IoT 장치에는 산업 기계, 스마트 에너지 그리드, 빌딩 자동화 및 직원이 업무에 가져오는 개인 장치가 포함됩니다.
What is Phishing
A phishing cyber attack targets users directly through email, text, or direct messages. Learn how phishing works, tips to spot & protect organizations against phishing scams.
PGP Encryption
Pretty Good Privacy (PGP) is a security program that secures communication and encrypts files. Discover what PGP encryption is and how Fortinet helps you encrypt your data with PGP.
Malware Analysis
Learn what malware analysis is and how it can improve your enterprise security. Discover the stages of malware analysis to better understand its benefits.