Fortinet
Fortinet is a global leader and innovator in Network Security. Our mission is to deliver the most innovative, highest performing network security platform to secure and simplify your IT infrastructure. We are a provider of network security appliances and security subscription services for carriers, data centers, enterprises, distributed offices and MSSPs. Because of constant innovation of our custom ASICs, hardware systems, network software, management capabilities and security research, we have a large, rapidly growing and highly satisfied customer base, including the majority of the Fortune Global 100, and we continue to set the pace in the Network Security market. Our market position and solution effectiveness has been widely validated by industry analysts, independent testing labs, business organizations, and the media worldwide. Our broad product line of complementary solutions goes beyond Network Security to help secure the extended enterprise.
Fortinet is headquartered in Sunnyvale, California, with offices around the world. Founded in 2000 by Ken Xie, the visionary founder and former president and CEO of NetScreen, Fortinet is led by a strong and seasoned management team with deep experience in networking and security. For more information, visit our website at www.fortinet.com
-
02:27 Popular
FortiGate Cookbook - Creating A Security Policy To Identify Users
Added 367 Views / 0 LikesEnable FortiGate user authentication by creating a user group named Sales and adding a user named wloman to this group. Then add an identity based policy to a security policy that accepts connections from the internal network to the Internet. Add the Sale
Featured -
05:08 Popular
FortiGate Cookbook - Secure WiFi With FortiAP
Added 365 Views / 0 LikesConfiguring a small office WiFi network by using a FortiGate unit to manage an FortiAP Remote WiFi access point. The WiFi network uses DHCP to assign IP addresses and WPA2-Personal security. WPA2-Personal security means there will be one preshared key tha
Featured -
04:55 Popular
FortiGate Cookbook - Captive Guest Portal (5.0)
Added 363 Views / 0 LikesIn this video, you're going to learn how to set up a captive guest portal for wifi users. A captive portal brings security (or access control) to an otherwise open wireless network. To allow visitors to access your wireless network and internet, you can c
Featured -
03:56 Popular
FortiGate Cookbook - Basic Firewall Configuration (5.0)
Added 362 Views / 0 LikesIn this video, you're going to learn how to perform basic firewall configuration, creating addresses, policies, and security profiles. You can use firewall policies and security profiles to secure network user traffic and limit it to approved services and
Featured -
02:36 Popular
FortiGate Cookbook - Explicit Web Proxy (5.0)
Added 362 Views / 0 LikesIn this video, you're going to learn how to set up the FortiGate Explicit Web Proxy to allow users on your internal network to browse the web through a web proxy. By also enabling web caching for web proxy users, you can speed up web browsing for your use
Featured -
08:48 Popular
FortiGate Cookbook - VDOM Configuration (5.2)
Added 360 Views / 0 LikesIn this video, you will learn how use Virtual Domains or VDOMs to host two FortiOS instances on a single FortiGate unit. Virtual Domains (VDOMS) can be used to divide a single FortiGate unit into two or more virtual instances of FortiOS. These instances f
Featured -
04:34 Popular
FortiGate Cookbook - FSSO Polling Using Windows AD (5.2)
Added 357 Views / 0 LikesIn this video, you will learn how configure Fortinet Single Sign On directly in the security policy using the new FSSO wizard, introduced in FortiOS 5.2.2. Visit Fortinet's documentation library at http://docs.fortinet.com or our video portal at http://vi
Featured -
00:27 Popular
Hidex Demo 2: Invoking A Hidden Method In DEX Executables
Added 357 Views / 0 LikesThe demo shows a PoC application where a hidden method named "thisishidden()" is successfully called by the application. This was presented at conferences Hacktivity and Hack.Lu in Octoboer 2013 More details at : http://www.fortiguard.com/paper/Playing-Hi
Featured -
02:30 Popular
A Working Demonstration Of AndroRat With Audio
Added 356 Views / 0 LikesMore details can be found at the related blog post : http://blog.fortinet.com/Mobile-RAT-Infestation/ Video by : Ruchna Nigam Voice : Patrick Grillo
Featured -
04:17 Popular
Positioning And Selling Fortinet Solutions
Added 356 Views / 0 LikesShannon Curran, Regional Major Accounts Director for the Caribbean and Central America at Fortinet, explains the value proposition and benefits of having integrated solutions and security architectures that effectively simplify Cybersecurity processes for
Featured -
03:20 Popular
FortiGate Cookbook Blocking Oversize File Downloads 5 0
Added 355 Views / 0 LikesFeatured -
05:59 Popular
FortiGate Cookbook YouTube For Education Filter 5 0
Added 355 Views / 0 LikesFeatured -
41:22 Popular
Fortinet Training Demo By LearningLynk
Added 355 Views / 0 LikesFortinet Training Demo by LearningLynk Fortinet Training Demo by LearningLynks India Ltd, LearningLynk Training videos for more details visit: http://www.learninglynk.com/ linke us on facebook: https://www.facebook.com/LearningLynk call us at: +91-8686348
Featured -
02:38 Popular
FortiGate Cookbook BYOD Scheduling 5 0 01 21
Added 354 Views / 0 Likeshttps://plus.google.com/+charlyprudent/ nosql-database.org www.couchbase.com http://www.network-engineer.usa.cc http://www.crunchbase.com/person/charly-prudent https://github.com/charlyprudent
Featured -
05:26 Popular
FortiGate Cookbook - User/Device Scheduling (5.2)
Added 353 Views / 0 LikesIn this video, you will learn how to create schedules that restrict internet access based on time and user account info, allowing you more control over what content users can access and how much bandwidth is used. This example involves a full-time employe
Featured -
06:04 Popular
FortiGate Cookbook - Remote Browsing With VPN (5.2)
Added 352 Views / 0 LikesIn this video, you will learn how to use remote IPsec and SSL VPN tunnels to bypass internet access restrictions. A VPN tunnel is an encrypted traffic passage between two endpoints. In this example, the VPN tunnel is between a local user running FortiClie
Featured -
11:12 Popular
The Art Of CyberWar (French)
Added 352 Views / 0 LikesGuillaume Lovet parle a LaTeleLibre.fr a propos de Stuxnet et l'art de cyberguerre Guillaume Lovet speaks to LaTeleLibre.fr about Stuxnet and the art of cyberwar
Featured