Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen
Beschreibung
Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise.
Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise.
Über den Autor
Kenneth Tam, Fortinet Certified Network Security Professional (FCNSP), is a senior security engineer at Fortinet, providing hands-on installation, support, and training to customers in the North Central United States. He has over 15 years' experience in the networking/security field from working with companies such as Juniper Networks, Netscreen Technologies, 3com, and US Robotics.
Inhaltsverzeichnis

Foreword
Introduction
Part I: General Introduction
1. Introduction to Unified Threat Management (UTM)
2. FortiGate Hardware Platform Overview
3. FortiOS Introduction

Part II: UTM Technologies Explained
4. Connectivity and Networking Technologies
5. Base Network Security
6. Application Security
7. Extended UTM Functionality
8. Analyzing Your Security Information with FortiAnalyzer
9. Managing Your Security Configurations with FortiManager

Part III: Implementing a Security (UTM) Project
10. Designing a Security Solution
11. Security on Distributed Enterprises/Retail (UTM Goes Shopping)
12. Security on Financial Institutions (UTM Goes to the Bank)
Appendix A: Troubleshooting the Project
Appendix B: Troubleshooting Technically

Details
Erscheinungsjahr: 2012
Genre: Importe, Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Inhalt: Einband - fest (Hardcover)
ISBN-13: 9781597497473
ISBN-10: 1597497479
Sprache: Englisch
Einband: Kartoniert / Broschiert
Autor: Tam, Kenneth
Hoz Salvador, Martin H.
Mcalpine, Ken
Hersteller: Syngress
Syngress Media
Verantwortliche Person für die EU: preigu GmbH & Co. KG, Lengericher Landstr. 19, D-49078 Osnabrück, mail@preigu.de
Maße: 235 x 192 x 30 mm
Von/Mit: Kenneth Tam (u. a.)
Erscheinungsdatum: 17.12.2012
Gewicht: 0,85 kg
Artikel-ID: 131478300