UTM security with Fortinet : Mastering FortiOS /
Saved in:
Imprint: | [Place of publication not identified] : Syngress, 2013. |
---|---|
Description: | 1 online resource : illustrations |
Language: | English |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/13608292 |
Other authors / contributors: | Tam, Kenneth. |
---|---|
ISBN: | 9781597499774 1597499773 9781597497473 1597497479 |
Notes: | Includes bibliographical references and index. Publisher supplied information; title not viewed. |
Summary: | Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise. Provides tips, tricks, and proven suggestions and guidelines to set up FortiGate implementationsPresents topics that are not covered (or are not covered in detail) by Fortinet's documentation Discusses hands-on troubleshooting techniques at both the project deployment level and technical implementation area. |
Similar Items
-
Security operations center guidebook : a practical guide for a successful SOC /
by: Jarpey, Gregory
Published: (2017) -
Guide to computer network security /
by: Kizza, Joseph Migga
Published: (2013) -
Security from first principles : a practical guide to the information security practice principles /
by: Jackson, Craig
Published: (2017) -
Cisco Security Agent /
by: Sullivan, Chad
Published: (2005) -
Client-side attacks and defense /
by: Shimonski, Robert
Published: (2012)