Wir verwenden Cookies und Analyse-Tools, um die Nutzerfreundlichkeit der Internet-Seite zu verbessern und für Marketingzwecke. Wenn Sie fortfahren, diese Seite zu verwenden, nehmen wir an, dass Sie damit einverstanden sind. Zur Datenschutzerklärung.
UTM Security with Fortinet
Details
Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise.
Autorentext
Kenneth Tam, Fortinet Certified Network Security Professional (FCNSP), is a senior security engineer at Fortinet, providing hands-on installation, support, and training to customers in the North Central United States. He has over 15 years' experience in the networking/security field from working with companies such as Juniper Networks, Netscreen Technologies, 3com, and US Robotics.
Klappentext
Traditionally, network security (firewalls to block unauthorized users, intrusion prevention systems to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified threat management makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise.
Zusammenfassung
Explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise. This book provides tips, tricks, and proven suggestions and guidelines to set up FortiGate implementations.
Inhalt
Foreword Introduction Part I: General Introduction 1. Introduction to Unified Threat Management (UTM) 2. FortiGate Hardware Platform Overview 3. FortiOS Introduction Part II: UTM Technologies Explained 4. Connectivity and Networking Technologies 5. Base Network Security 6. Application Security 7. Extended UTM Functionality 8. Analyzing Your Security Information with FortiAnalyzer 9. Managing Your Security Configurations with FortiManager Part III: Implementing a Security (UTM) Project 10. Designing a Security Solution 11. Security on Distributed Enterprises/Retail (UTM Goes Shopping) 12. Security on Financial Institutions (UTM Goes to the Bank) Appendix A: Troubleshooting the Project Appendix B: Troubleshooting Technically
Weitere Informationen
- Allgemeine Informationen
- GTIN 09781597497473
- Sprache Englisch
- Größe H235mm x B22mm x T191mm
- Jahr 2012
- EAN 9781597497473
- Format Kartonierter Einband (Kt)
- ISBN 978-1-59749-747-3
- Titel UTM Security with Fortinet
- Autor Kenneth Tam , Ken McAlpine , Martín H. Hoz Salvador , Josh More , Rick Basile , Bruce Matsugu
- Untertitel Mastering FortiOS
- Gewicht 1002g
- Herausgeber Syngress Media,U.S.
- Anzahl Seiten 452
- Genre Informatik