The previous post in this series provides an introduction to Network Access Control and the components of the security fabric oriented solution of Fortinet that …
Guides and Designs for the Network Security Generalist
The previous post in this series provides an introduction to Network Access Control and the components of the security fabric oriented solution of Fortinet that …
First, I would be remiss not to acknowledge the time that has passed since my last blog update. I have experienced quite a few life …
The most common use case for the FortiGate is to function as a security device and protect assets on the network. It is also used …
I was speaking to a colleague the other day about how great he thought FortiLink was. He was raving about the simplicity of the solution …
Okay, before I get into the details of this article, I know I have written about Zero Trust Network Access (ZTNA) and how it is …
Before I start this article, I want to acknowledge and thank one of my blog readers for reaching out to me. On Tuesday, I received …
This post concludes the series on Zero Trust Network Access. This series has covered an overview of ZTNA, all the way to using endpoint posture …
In my previous post, I discussed how to access web application and non-web applications via the Zero Trust Network Access in the Fortinet solution. In …
Sometimes I take for granted how certain tasks are not well defined in official FortiManager documentation. I just recently I saw a post on Reddit …