Product Resource Center

Additional Resources

Refine search

Document Type

Product

Industry

Solutions


67  matching results
Videos
Fortinet's Advanced Threat Protection: Why an Integrated Approach is Your Game Changer

With every new Advanced Security Threat, there come new security technologies. Right now, Sandboxing is emerging in response to the advanced malware making headlines. While an exciting technology, experience has taught us there are no “silver bullets. Yet another security layer's is not going to solve the problem on its own. Instead, Fortinet combines market leading prevention, detection and mitigation into a single cohesive approach powered by FortiGuard Labs to combating today's most Advanced Threats.

Videos
Tracking CryptoWall v3: The Cyber Threat Alliance at Work

In order to improve the security posture of the entire community, the Cyber Threat Alliance conducted in-depth research into CryptoWall, one of the most lucrative and broad-reaching ransomware campaigns affecting Internet users today. Sharing intelligence and analysis resources, the CTA profiled the latest version of CryptoWall, which impacted hundreds of thousands of users, resulting in over US $325 million in damages worldwide.

Videos
Georgia World Congress Center Exhibits High-Density Wi-Fi

Nowhere is more challenging from a device density perspective than in a major convention center. Learn how Meru Networks helps the Georgia World Congress Center support massive numbers of mobile devices in its 3.9 million square-foot facility.

Videos
10X Faster Firewall

10X Faster Firewall

Videos
Splunk Solution Overview

Fortinet's FortiGate App and Add-on for Splunk are available at splunkbase for free download. The solution further embraces Fortinet's SDN Security Framework to provide end-to-end threat visibility and control by flowing the best-in-class threat intelligence from FortiGate physical and virtual appliances into Splunk Enterprise. Real-time data analysis provides the ability to respond and act on any breach incident instantaneously.

Videos
On-Demand Fortinet Firewall Orchestration with Cisco ACI

The video shows step by step configuration for automatic FortiGate Firewall service insertion within Cisco ACI. Through L4-L7 service integration, FortiGate device package contains XML metadata describing Fortinet's Data Center Firewall services and can be deployed through single pane of orchestration in APIC Controller for both physical and Virtual FortiGate Data Center Firewall Appliances.

Videos
End-to-End Network Security: One Platform, No Gaps!

If you look at most network security deployments you'll likely find various vendors covering different aspects of security. One vendor for a firewall, one for email security, another for detecting malicious web traffic. The problem is, these various solutions work independently of each other, leaving gaps in the network that can be exploited. Fortinet's platform solves all of this with a single solution that prevents, detects and mitigates threats using a unique Advanced Threat Detection approach from the network core to end user device. Imagine that, one platform, complete security, and no gaps!

Videos
Attacker and Defender Lifecycle: Knowing your Adversaries, Knowing the Battlefield and Knowing Yourself

As company networks continue to grow in size and volume, cyber-attacks also continue to grow in sophistication which makes it very difficult for organizations to defend their critical assets, often times merely reacting to the threats as they occur. We are losing the cyber battle. To successfully defend our cyber assets whether from a Nation State or Organized Crime companies need to understand the attacker and defender lifecycle. A proper defensive posture requires a company to have an understanding of their adversaries, of the battlefield and of their own strengths and weaknesses. Anthony Giandomenico, Senior Security Strategist at Fortinet, breaks down the phases of the attacker and defender life cycle with an overview of the adversary's tactics, techniques and procedures.

Videos
Protect Against Layer 7 DDoS Attacks with FortiDDoS

Mark Byers, Director of Product Marketing, provides an overview on how to protect your network from layer 7 DDoS attacks with FortiDDoS DDoS Attack Mitigation Appliances

Videos
Working Smarter Thanks To Fortinet's Cyber Threat Assessment Program

Fortinet's Cyber Threat Assessment Program (CTAP) gives you a comprehensive look at potential vulnerabilities, performance bottlenecks, and productivity drains on your network. Find out how CTAP can mean the difference between thinking your network security is all buttoned up and actually knowing where there is still work to be done.