You are here

Whitepapers

All Years
Security Gate & Gi Firewall - Protecting the Mobility Infrastructure
This white paper introduces the components and architecture of a secured LTE network implementation. It also explains why FortGate consolidated security platforms is best suited for carriers and service providers seeking a SeGW solution for their mobility networks.
2013
Threats on the Horizon: The Rise of the Advanced Persistent Threat
This Fortinet whitepaper (with executive summary) explores a number of highly targeted attacks and establishes common stages shared by many such attacks before delving into the range of measures- across product, people and process- an organization should consider to reduce its risk related to this emerging class of threat.
2013
SANS Analyst Whitepaper: Real-World Testing of Next-Generation Firewalls
This analyst whitepaper will help you determine which solution is best for your organization. It highlights: Recent trends in the threat landscape and recommended countermeasures, Essential capabilities to consider in a next generation firewall and How to define requirements for your organization, and test for them.
2013
FortiGuard Midyear Threat Report
This report highlights the most active threats our lab has analyzed in the last six months, new mobile malware data, an in-depth look at the recent S. Korean cyber attack and more.
2013
The Fortinet Secure Health Architecture
This white paper will highlight the Fortinet secure health architecture, as well as describe how to provide end-to-end security for modern healthcare organizations. It will highlight shifts in the industry and discuss Fortinet鈥檚 security approach and various options Fortinet has available between its strategies and products.
2013
Comprehensive Email Security for Enterprises and Service Providers
This white paper details the FortiMail Email Security platform and how it can be deployed to help protect your email servers against the evolving threat landscape.
2013
FortiMail Identity Based Encryption
This document details how email communications can be quickly and simply secured with zero impact to the internal users and no requirement for complicated client software or encryption keys to be shared with the recipient.
2013
UTM in Education
This paper will investigate many of the key challenges that universities and institutions of higher education face when attempting to secure their systems. It will discuss industry best practices designed to secure key systems such as databases and the network. Finally, this paper will discuss Fortinet鈥檚 unified approach to security, showing that UTM provides a cost-effective solution to increasing security for educational institutions.
2013
Secure Wireless LAN Solutions
This paper is intended for CIOs and CISOs in the retail industry. Maintaining compliance with PCI DSS is a top concern as there are significant effects on business operations, payment card transactions, organizational security and data protection.
2013
Anatomy of a Botnet Report
One of the greatest challenges in Internet security today is how to contain the global scourge that is the botnet. Botnet authors and their criminal organizations are continuously developing innovative ways to recruit new victims into their networks and monetize them.
2013
Real-World Network Security Performance Testing
NSS Labs' 2013 group firewall test evaluated competing products' ability to provide high performance security and low latency. See how well the FG-800C performed in real-world tests.
2013
Fortinet recognized for delivering outstanding enterprise management, security effectiveness, and TCO
Fortinet鈥檚 FortiGate 800C Excels in NSS Labs 2013 Group Firewall Test to Earn Highest "Recommend" Rating with Very High Security Effectiveness and Very Low TCO
2013
Distributed Enterprise Solutions
See how Fortinet can provide the end-to-end, multi-layer security that retailers need to securely deliver a new breed of services for the customers and improve their own bottom line.
2013
Cutting Edge Security and Performance - 5001C is a Clear Choice
Fortinet allows MSSPs to deliver cutting edge security technologies to SMBs, while preserving their margin requirements and addressing broader markets. Through higher performance products like the 5001C blade and innovative approaches in providing security services such as using multi-tenant VDOMs, Fortinet gives providers the flexibility to grow their businesses into green field opportunities that are unreachable using any other equipment provider.
2013
Fortinet 2013 Cybercrime Report
This paper explores the world of the cybercriminal, describes how they build and deploy attacks to harvest valuable data, and what you can do to fight back.
2012
The Power To Secure The Cloud
How Fortinet protects your data as it flows to and from the cloud
2012
Pragmatic WAF Management: Giving Web Apps a Fighting Chance
Securosis鈥 鈥淧ragmatic WAF Management: Giving Web Apps a Fighting Chance鈥 discusses how to effectively use a web application firewall (WAF) for countering application threats and mitigate application vulnerabilities.
2012
FortiOS 5 List of New Features & Enhancements
FortiOS 5 contains over 150 new features and enhancements. These are grouped into 25 different categories; including Client Reputation, User-Based Identity, User Notification, IPv6 and Antivirus enhancements.
2012
The Importance of Client Reputation
This paper will examine the changing network threat landscape and the move from static to dynamic security. It introduces Fortinet鈥檚 newest client reputation functionality in FortiOS 5.0 Advanced Security Operating System. This functionality allows granular controls to evaluate what users are doing and if those actions might be part of a larger threat to the organization.
2012
ROI of FortiGate
Fortinet technology provides you with business and security returns at a substantially lower cost. IANS Security Research conducted an Information Security Investment Analysis (ISIA) of Fortinet's unified threat management (UTM) solutions, interviewing Guess, Inc., an active Fortinet customer.
2012
NSS Labs 2012 Intrusion Prevention Systems Security Value Map
FortiGate-3240C delivers IPS protection, performance, and low TCO to earn NSS Labs鈥 鈥淩ecommended鈥 rating.
2012
Protecting against DoS/DDoS Attacks with FortiWeb漏 Web Application Firewall
The white paper discusses today鈥檚 organization challenges having to deal with the rise in application layer DDoS attacks, the use of botnets in these attacks and the need for an integrated solution to protect against these attacks.
2012
FortiGate-3950B Demonstrates Highest Appliance Throughput and Resiliency in BreakingPoint鈩 Tests
Resiliency testing measures the performance of a given firewall under stressful and varying conditions. The BreakingPoint Resiliency Score鈩 is an automated test based on industry standards for performance, security, and stability of network and security devices. Fortinet recently conducted rigorous resiliency testing on the FortiGate庐-3950B, using multiple BreakingPoint鈩 Elite chassis in different configurations in order to simulate real-world deployment. The FortiGate-3950B passed with an overall BreakingPoint score of 95/100 - the highest score on record.
2012
Unified Threat Management (UTM) for Dummies
Learn how UTM gives you the power to control your applications and devices, improve network security and performance, and consolidate the management of essential security technologies.
2012
ICSA - Compliance, Incentives and Penalties: Hot Topics in US Health IT
Download the ICSA whitepaper to get a better understanding of some of the most noteworthy requirements for security in the USA鈥檚 Healthcare Provider IT market including PCI, HIPAA鈥揃AA and ARRA鈥揌ITECH (HIPAA II)-covered entity.
2011
Next Generation Security for Enterprise Networks
Enterprises and service providers are deploying Next-Generation Firewalls in an effort to control web-based applications and block new blended network threats. Some Next-Generation Firewalls fail to include important next-generation features as well as adequate traditional network protections. This white paper defines the security features needed in a 'next-generation security' platform.
2011
Towards a Consolidated Approach for PCI-DSS Compliance
Over the past five years, the PCI-DSS framework has evolved from being mere guidelines without enforceable sanctions to a 鈥榤ust-have鈥 certification that you are required to obtain if you are involved in manipulating, storing or transmitting cardholder data. This white paper discusses how a consolidated approach to security can assist in PCI compliance.
2011
Real Time Network Protection for Educational Institutions
Discuses the challenges of protecting today's educational networks and the need for a new, cost-effective and architecturally different approach for distributed and diverse educational network and computing environments.
2011
A Practical Guide for Beginning the Migration to IPv6
Describes the importance of securing the network against IPv6 threats well before the introduction of any IPv6 traffic, and outlines the steps involved to begin securing a transitional IPv4/IPv6 network.
2011
The Need for Secure Communications in a Distributed Environment
Discusses the challenges of protecting distributed environments and the need for network security systems that are designed to work together in a unified manner.
2011
Understanding How File Size Affects Malware Detection
Offers insight on how malware inspection performance is related to the size of malware-infected files and how different scanning methods can help to strike a balance between performance and security.
2011
Web Filtering: An Essential Part of a Consolidated Security System
Discuses the challenges of protecting enterprise networks with a layered defense employing multiple security technologies to protect against malicious content, sites, and other web-borne threats.
2011
Accelerating Unified Threat Management with Specialized Hardware
Provides a brief overview of the evolution of UTM platforms and explains why corporate IT departments are deploying specialized hardware to keep pace with new security threats and ever-faster enterprise networks.
2011
FortiGate DoS Protection - Block Malicious Traffic Before It Affects Critical Applications and Systems
Describes common DoS techniques, explains the technology integrated into every FortiGate consolidated security platform that helps in blocking DoS attacks, and offers suggestions on how to prevent an organization鈥檚 network from being used to attack another organization
2011
Controlling Web 2.0 Applications in the Enterprise
Describes the threats found in Web 2.0 applications, and how organizations need to deploy new methods of monitoring and controlling these Internet-based applications in order to discover and mitigate hidden security threats.
2011
Securing SCADA Infrastructure
Discusses how to protect Supervisory Control and Data Acquisition, or SCADA systems (specialized computer networks and devices that work in concert to monitor and control key processes involved in the management of machinery, equipment and facilities).
2010
Vulnerability Management for the Distributed Enterprise
Describes the challenges large distributed enterprises face in deploying vulnerability management technology in dozens, hundreds, or even thousands of remote locations, and Fortinet's solutions.
2010
Migrating to a FortiGate Firewall
Describes the best practices for performing firewall migrations, the benefits a migration process can achieve, and steps to take to ease the migration process itself.
2010
PCI Retail Audit Readiness
Highlights top reasons for assessment failure or security breach, and outlines a better way to secure your payment card infrastructure utilizing a UTM approach with an integrated Vulnerability Management (VM) strategy within an ISO/IEC 27001/2 Information Security Management System (ISMS) framework.
2010
FortiWeb Web Application Firewall: Ensuring Compliance for PCI DSS 6.5 and 6.6
Discusses the challenges organizations face in meeting PCI DSS 6.5 and 6.6 requirements, and how FortiWeb Web Application Firewall can address those challenges.
2010
Global Reputation Monitoring: The FortiGuard Security Intelligence Database
Describes how Fortinet鈥檚 FortiGuard Security Services delivers two essential services to Fortinet customers: Blocking spam emails before they reach customers鈥 mailboxes and blocking customers鈥 access to malicious web sites.
2010

CALL NOW! 1-866-868-3678


With Fortinet, we can deliver our customers various combinations of security functions as a real-time service - all from a single appliance. What the end customer experiences is a seamless, effective and reliable choice of security services, while we enjoy the best potential returns from our business model with a platform that can scale as our customer base grows.

Laurent Jacquet
Marketing Director for Enterprise Products
N9uf Cegetel