Utm Security With Fortinet: Mastering Fortios by Kenneth TamUtm Security With Fortinet: Mastering Fortios by Kenneth Tam

Utm Security With Fortinet: Mastering Fortios

byKenneth Tam, Martín H. Hoz Salvador, Ken Mcalpine

Paperback | November 27, 2012

Pricing and Purchase Info

$72.20 online 
$75.95 list price
Earn 361 plum® points

Prices and offers may vary in store


In stock online

Ships free on orders over $25

Not available in stores


Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise.

  • Provides tips, tricks, and proven suggestions and guidelines to set up FortiGate implementations
  • Presents topics that are not covered (or are not covered in detail) by Fortinet's documentation
  • Discusses hands-on troubleshooting techniques at both the project deployment level and technical implementation area
Kenneth Tam, Fortinet Certified Network Security Professional (FCNSP), is a senior security engineer at Fortinet, providing hands-on installation, support, and training to customers in the North Central United States. He has over 15 years' experience in the networking/security field from working with companies such as Juniper Networks,...
Title:Utm Security With Fortinet: Mastering FortiosFormat:PaperbackDimensions:452 pages, 9.25 × 7.5 × 0.68 inPublished:November 27, 2012Publisher:Syngress PublishingLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:1597497479

ISBN - 13:9781597497473


Table of Contents

Foreword Introduction Part I: General Introduction Chapter 1:Introduction to Unified Threat Management (UTM) Chapter 2:FortiGate Hardware Platform Overview Chapter 3:FortiOS Introduction Part II: UTM Technologies Explained Chapter 4:Connectivity and Networking Technologies Chapter 5:Base Network Security Chapter 6:Application Security Chapter 7:Extended UTM Functionality Chapter 8:Analyzing Your Security Information with FortiAnalyzer Chapter 9:Managing Your Security Configurations with FortiManager Part III: Implementing a Security (UTM) Project Chapter 10:Designing a Security Solution Chapter 11:Security on Distributed Enterprises/Retail (UTM Goes Shopping) Chapter 12:Security on Financial Institutions (UTM Goes to the Bank) Appendix A:Troubleshooting the Project Appendix B:Troubleshooting Technically