UTM security with Fortinet Mastering FortiOS

Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified...

Descripción completa

Detalles Bibliográficos
Otros Autores: Tam, Kenneth (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Boston : Syngress 2013.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628593206719
Descripción
Sumario:Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's For
Notas:Description based upon print version of record.
Descripción Física:1 online resource (485 p.)
Bibliografía:Includes bibliographical references and index.
ISBN:9781283810791
9781597499774