Защита трафика
Even though hackers and data thieves have gotten more sophisticated, so has threat protection. An advanced threat-protection system provides security solutions that protect all devices on your network from malware and attempts to access sensitive data. This is accomplished by honing in on different attack surfaces and applying protective measures. This means protecting elements of your network such as endpoint devices, servers, and routers. Further, on a software level, email gateways and the central management console of your network can be shielded from a variety of threats. Each company’s setup is different in complexity and size, and your threat-protection solution can be customized to suit your needs.
Threat Protection Issues
Code Scanning
Learn what code scanning is, how it finds vulnerabilities, and the different code scanning approaches. Discover how code scanning can benefit your organization.
Heuristic Analysis
Heuristic analysis inspects commands or instructions in applications to detect malicious activity. Learn how it works and how it can help protect your system.
What is Machine Learning?
Machine learning enables computers to learn without someone having to program them. Read an introduction to machine learning, types, and its role in cybersecurity.
Spam filters
Learn what spam filters are and how they can help you. ✓ Discover how Fortinet can protect your critical data from being compromised in a breach.
Insider Threats
An insider threat is a security risk originating from an employee or authorized user. Learn the different insider threat types and how to protect your organization against them.
What is Honeypot
Learn what is a honeypot and are designed to look like attractive targets, and get deployed to allow IT, teams, to monitor the system’s security responses and to redirect the attacker away from their ...
What is pci compliance
The Payment Card Industry Data Security Standard (PCI DSS) compliance helps secure credit card transactions. Discover how to become PCI DSS compliant and maintain the status.
Captcha
CAPTCHA enables websites to validate visitors and prevent bots from accessing sites. Discover the different types of CAPTCHA code and how to configure CAPTCHA with Fortinet.
Threat Modeling
Threat modeling identifies and communicates information about the threats that may impact a particular system or network. Learn what threat modeling is and its techniques.
Indicators of compromise
Learn what indicators of compromise (IOCs) are, how they work, and the most common types.
Advanced threat protection atp
Learn what advanced threat protection is, the common ATP tactics, and how to defend against them. Discover how the Fortinet NGFW can filter all incoming and outgoing traffic and detect advanced threat ...
Fault tolerance
Fault tolerance ensures systems continue to operate as usual despite failures or malfunctions. Discover how fault-tolerant systems work, the difference between fault tolerance vs. high availability, a ...
DDoS Protection
DDoS protection is a security solution that detects and defends against denial-of-service threats. Create a DDoS protection plan to mitigate network attacks.
Phishing email analysis
Learn five different ways to spot phishing scams, the kind of data that is at risk, and how to create awareness. Discover the security tools most effective at fighting phishing.
Active defense
Active defense is the use of offensive tactics to slow down hackers and prevent cyberattacks. Discover what active cyber defense is and how the Fortinet suite of products can help your organization st ...
Implement ddos mitigation strategy
A DDoS mitigation strategy is necessary to protect organizations from potentially devastating DDoS attacks. Learn the steps to DDoS mitigation and what to look for in a mitigation provider.
IoT Device Vulnerabilities
Internet-of-Things (IoT) device vulnerabilities can lead to data theft and sophisticated cyberattacks. Discover the top IoT vulnerabilities and how to best protect your network and devices.
IoT Best Practices
Internet-of-Things (IoT) devices can be vulnerable to hacking and cyberattacks. Learn why this is so and the IoT security best practices you can implement to safeguard your devices, networks, and user ...
POS Security
Point-of-sale security (POS security) creates safe environments for customers to make purchases and complete transactions. Discover POS security measures your organization needs to implement and how F ...
Black hat security
Black Hat Security is a criminal hacking activity carried out by black hat hackers. Discover who black hat hackers are, how they damage corporate systems, and how Fortinet can help your organization s ...
Protecting Customer Information
Learn how companies protect consumer information to strengthen the organization. Discover how the Fortinet next-generation firewalls (NGFWs) and SD-WAN can help.
Devsecops
DevSecOps means integrating security at every phase of the software development lifecycle. Learn how development teams can deliver secure code more quickly.
Smurf Attack
A smurf attack is a form of DDoS attack that overwhelms networks and servers with Internet Control Message Protocol (ICMP) echo requests. Discover what is a DDoS smurf attack and how the FortiDDoS sol ...
Email Security
Email security includes the techniques and technologies that protect email accounts and communications. Learn how to guard against malware and phishing attacks.
DoS-атака и DDoS-атака
DoS- и DDoS-атаки наводняют сервер трафиком, пытаясь сделать его недоступным. Узнайте, чем отличаются DoS- и DDoS-атаки и как от них защититься.
Whitehat security
Learn what white hat security is, the need for white hat security and how a white hat hacker helps secure your network. Discover how FortiWeb uses several sophisticated tools like parameters, HTTP met ...
What is Splunk
Splunk helps correlate, capture, and index real-time data, from which it creates alerts, dashboards, and graphs. Discover how the FortiGate App for Splunk visualizes data, logs events, and improves de ...
Что такое TTL
Узнайте, что такое время жизни (TTL) и как оно влияет на ваш веб-сайт. Узнайте, как инструменты Fortinet, такие как FortiGSLB, могут улучшить общее впечатление ваших клиентов в интернете.
Протокол управляющих сообщений
ICMP — сетевой протокол, который используется для передачи сведений о проблемах передачи данных. Узнайте, как FortiDDoS защитит вашу систему от DDoS-атак.
TCP-IP
Узнайте о значении моделей протокола управления передачей (TCP), которые обеспечивают работу приложений и устройств. ✓ Свяжитесь с нами для получения информации о высококлассных сетевых устройствах.
Zero Day Attack
Zero day attacks are your network's unknown vulnerabilities. Discover how Zero Day Exploit Works and methods to defend against them.
Advanced Persistent Threat
Advanced persistent threats (APTs) hide in your network undetected, and as attacks evolve, businesses of all sizes are at risk. Learn how to combat APT.
Двухфакторная идентификация (2FA)
Двухфакторная аутентификация — повышенная безопасность при входе в систему. Узнайте всё о 2FA и защите пользователей с двухэтапной аутентификацией Fortinet.
What is Botnet
Learn what botnets are, why they are created, and the types of botnet cyber crimes and threats. Protect your organization against botnet attacks using Fortinet tools.
What is Sandboxing
Learn what is a sandbox, why it's important, and how to create a sandbox environment to protect your network. Fortinet's sandbox software provides enhanced safety and protection against zero-day threa ...
Spear Phishing
Spear Phishing attacks are highly targeted, hugely effective, and difficult to prevent. Explore how Spear Phishing works and best practices for its prevention.
What is Cyber Attack
A Cyber Attack is how cybercriminals gain access to networks and systems. Discover common Cyber Attack Methods and how the Fortinet cybersecurity solution can help you prevent them.
Data Exfiltration
Data exfiltration is the theft or unauthorized removal or movement of any data from a device. Discover the different data exfiltration types and how Fortinet solutions can prevent data exfiltration th ...
Malware
Malware, or malicious software, refers to cyberattacks such as viruses, spyware, and ransomware. Learn how to recognize and combat malware on your network.
DDoS Attack
Distributed Denial-of-Service (DDoS) attacks can flood your servers and take down online services. Learn more about DDoS Meaning, attack types, and examples.
Brute force attack
A brute force attack is a trial-and-error method to crack passwords and encryption keys. Discover how attackers launch a brute force attack and the impact on business-critical applications.
Man in the middle attack
A man-in-the-middle (MITM) attack occurs when criminals hijack web protocols to steal data. Discover how does a MITM attack works and how to protect endpoints.
SOAR
Learn more about the Security Orchestration, Automation, and Response (SOAR) platform. How does SOAR differ from SIEM and what are the benefits of implementing it?
Унифицированное управление угрозами
Узнайте о преимуществах Unified Threat Management и о том, как Fortinet UTM с функциями антивируса сканирует сетевой трафик на наличие угроз и блокирует их.
IoT
The Internet of Things (IoT) is defined as a network of physical objects that are connected to the internet using software, sensors, and other technologies. Learn what IoT means and its benefits.
What Is an IP Address
Learn what is an IP address and as a unique number identifies any device that connects to the internet. Discover how IP addresses work and what IP addresses are available.
Информационная безопасность Интернета вещей (IoT)
Информационная безопасность Интернета вещей — это защита устройств IoT. Ознакомьтесь с безопасностью IoT, охватывающей агрегаты, энергосети и многое другое.
What is Phishing
What is phishing? During a phishing attempt, an attacker might pose as one of your trusted contacts. Protect your data by learning how to spot and avoid phishing messages.
PGP Encryption
Pretty Good Privacy (PGP) is a security program that secures communication and encrypts files. Discover what PGP encryption is and how Fortinet helps you encrypt your data with PGP.