Samenvatting

Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise.

Specificaties

ISBN13:9781597497473
Taal:Engels
Bindwijze:Paperback

Inhoudsopgave

<p>Foreword<br>Introduction<br>Part I: General Introduction<br>1. Introduction to Unified Threat Management (UTM)<br>2. FortiGate Hardware Platform Overview<br>3. FortiOS Introduction<br><br>Part II: UTM Technologies Explained<br>4. Connectivity and Networking Technologies<br>5. Base Network Security<br>6. Application Security<br>7. Extended UTM Functionality<br>8. Analyzing Your Security Information with FortiAnalyzer<br>9. Managing Your Security Configurations with FortiManager<br><br>Part III: Implementing a Security (UTM) Project<br>10. Designing a Security Solution<br>11. Security on Distributed Enterprises/Retail (UTM Goes Shopping)<br>12. Security on Financial Institutions (UTM Goes to the Bank)<br>Appendix A: Troubleshooting the Project<br>Appendix B: Troubleshooting Technically</p>

Rubrieken

    Personen

      Trefwoorden

        UTM Security with Fortinet