by admin | Jan 30, 2020 | IT and Security
Content Inspection and URL blocking, An essential security feature, content inspection is defined by Wikipedia as a type of network filtering that seeks out “viruses, spam, data loss, and other content-level criteria” from a file. This examination is...
by admin | Jan 30, 2020 | IT and Security, Technology
Hidden Threats? If they want to ensure complete content protection that detects all hidden threats, IT managers should select a firewall carefully. Fortinet’s firewalls are a particularly good option for businesses that are realizing that typical...
by admin | Jan 30, 2020 | IT and Security
The Best WiFi and Security For Small & Medium Business 2020. So what is the best WiFi for small businesses? First off, let me tell you what isn’t. It’s NOT a $50 wireless router from Best Buy or Future Shop. It’s NOT those cheap wireless extenders promising...
by admin | Jan 11, 2020 | IT and Security
Fortigate Trafic Shaping Explanation: Fortigate: Traffic Shapers Configuration FortiOS 6.0.x.Traffic Shapers is in other words equal to QoS (Quality of service). This is a service-quality model, prioritizing certain apps and services at the expense of other apps and...
by 1livingmylife12005 | Jun 21, 2019 | IT and Security, Technology
Fortinet SD-WAN Architecture & Demo Fortinet SD-WAN Architecture and Demo 2019. In this session, Stephen Watkins and Peter Chen will provide an architectural overview of the Fortinet Secure SD-WAN solution accompanied by a walkthrough demo of the 3 major SD-WAN...
by admin | May 4, 2019 | IT and Security
Description Can be use in any fortigate model with FortiOS 3.0MR2 or newer.This article explains the difference between the IPSec VPN phase 2 auto-negotiate and keepalive options, and why you probably want to use both of them. Auto-negotiate What is auto-negotiate? An...