Book description
Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise.- Provides tips, tricks, and proven suggestions and guidelines to set up FortiGate implementations
- Presents topics that are not covered (or are not covered in detail) by Fortinet’s documentation
- Discusses hands-on troubleshooting techniques at both the project deployment level and technical implementation area
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Dedications
- Acknowledgements
- About The Author
- Foreword
- Preface
- Section I: General Introduction
- Section II: UTM Technologies Explained
- Section III: Implementing a Security (UTM) Project
- Appendix A. Troubleshooting the Project
- Appendix B. Troubleshooting Technically
- Appendix C. Country Codes
- Glossary
- Subject Index
Product information
- Title: UTM Security with Fortinet
- Author(s):
- Release date: December 2012
- Publisher(s): Syngress
- ISBN: 9781597499774
You might also like
book
IKEv2 IPsec Virtual Private Networks: Understanding and Deploying IKEv2, IPsec VPNs, and FlexVPN in Cisco IOS
Create and manage highly-secure Ipsec VPNs with IKEv2 and Cisco FlexVPN The IKEv2 protocol significantly improves …
video
CCNP Security Cisco Identify Services Engine SISE 300-715
8+ Hours of Video Instruction CCNP Security Management (SISE) 300-715 Complete Video Course focuses on implementing …
video
CCNP and CCIE Security Core SCOR 350-701
12+ Hours of Video Instruction More than 12 hours of video instruction and remediation organized to …
book
Cisco Software-Defined Access
The definitive Cisco SD-Access resource, from the architects who train Ciscos own engineers and partners This …