
The most common use case for the FortiGate is to function as a security device and protect assets on the network. It is also used …
Guides and Designs for the Network Security Generalist
Blog posts related to FortiGate and FortiOS
The most common use case for the FortiGate is to function as a security device and protect assets on the network. It is also used …
I was speaking to a colleague the other day about how great he thought FortiLink was. He was raving about the simplicity of the solution …
Okay, before I get into the details of this article, I know I have written about Zero Trust Network Access (ZTNA) and how it is …
Before I start this article, I want to acknowledge and thank one of my blog readers for reaching out to me. On Tuesday, I received …
This post concludes the series on Zero Trust Network Access. This series has covered an overview of ZTNA, all the way to using endpoint posture …
In my previous post, I discussed how to access web application and non-web applications via the Zero Trust Network Access in the Fortinet solution. In …
In the previous blog post, I cover how the FortiGate provides secured access to web applications via its reverse proxy functionality in its Zero Trust …
In the previous blog post, I covered setting up the basis of security with Zero Trust Network Access (ZTNA) through establishing telemetry. In this post, …
In the previous posts I laid the foundation to explain how I am using Zero Trust Network Access (ZTNA) to solve my remote access problem …