UTM Security with Fortinet book cover

UTM Security with Fortinet

Mastering FortiOS

Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise. 

Audience

Network administrators, Information security managers, Network security architects, Computer security and data security professionals

Paperback, 452 Pages

Published: November 2012

Imprint: Syngress

ISBN: 978-1-59749-747-3

Contents

  • Foreword
    Introduction
    Part I: General Introduction

    Chapter 1: Introduction to Unified Threat Management (UTM)
    Chapter 2: FortiGate Hardware Platform Overview
    Chapter 3: FortiOS Introduction
    Part II: UTM Technologies Explained
    Chapter 4: Connectivity and Networking Technologies
    Chapter 5: Base Network Security
    Chapter 6: Application Security
    Chapter 7: Extended UTM Functionality
    Chapter 8: Analyzing Your Security Information with FortiAnalyzer
    Chapter 9: Managing Your Security Configurations with FortiManager 
    Part III: Implementing a Security (UTM) Project
    Chapter 10: Designing a Security Solution
    Chapter 11: Security on Distributed Enterprises/Retail (UTM Goes Shopping)
    Chapter 12: Security on Financial Institutions (UTM Goes to the Bank)
    Appendix A: Troubleshooting the Project
    Appendix B: Troubleshooting Technically