The previous post in this series provides an introduction to Network Access Control and the components of the security fabric oriented solution of Fortinet that …
Category: Network Security
Category of all network security related posts
First, I would be remiss not to acknowledge the time that has passed since my last blog update. I have experienced quite a few life …
The most common use case for the FortiGate is to function as a security device and protect assets on the network. It is also used …
I was speaking to a colleague the other day about how great he thought FortiLink was. He was raving about the simplicity of the solution …
Okay, before I get into the details of this article, I know I have written about Zero Trust Network Access (ZTNA) and how it is …
Before I start this article, I want to acknowledge and thank one of my blog readers for reaching out to me. On Tuesday, I received …
This post concludes the series on Zero Trust Network Access. This series has covered an overview of ZTNA, all the way to using endpoint posture …
In my previous post, I discussed how to access web application and non-web applications via the Zero Trust Network Access in the Fortinet solution. In …
In the previous blog post, I cover how the FortiGate provides secured access to web applications via its reverse proxy functionality in its Zero Trust …
In the previous blog post, I covered setting up the basis of security with Zero Trust Network Access (ZTNA) through establishing telemetry. In this post, …